idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
243,275
radare2
e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7
Fix #12417/#12418 (arm assembler heap overflows)
0
static bool parseOperands(char* str, ArmOp *op) { char *t = strdup (str); int operand = 0; char *token = t; char *x; int imm_count = 0; int mem_opt = 0; if (!token) { return false; } while (token) { char *next = strchr (token, ','); if (next) { *next++ = 0; } while (token[0] == ' ') { token++;...
970,140,649,043,312,100,000,000,000,000,000,000
armass64.c
201,736,002,340,352,550,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-20457
In radare2 through 3.1.3, the assemble function inside libr/asm/p/asm_arm_cs.c allows attackers to cause a denial-of-service (application crash via an r_num_calc out-of-bounds read) by crafting an arm assembly input because a loop uses an incorrect index in armass.c and certain length validation is missing in armass64....
https://nvd.nist.gov/vuln/detail/CVE-2018-20457
196,722
radare2
e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7
Fix #12417/#12418 (arm assembler heap overflows)
1
ut32 armass_assemble(const char *str, ut64 off, int thumb) { int i, j; char buf[128]; ArmOpcode aop = {.off = off}; for (i = j = 0; i < sizeof (buf) - 1 && str[i]; i++, j++) { if (str[j] == '#') { i--; continue; } buf[i] = tolower ((const ut8)str[j]); } buf[i] = 0; arm_opcode_parse (&aop, buf); aop.off...
163,124,739,879,640,360,000,000,000,000,000,000,000
armass.c
178,825,005,188,026,550,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-20457
In radare2 through 3.1.3, the assemble function inside libr/asm/p/asm_arm_cs.c allows attackers to cause a denial-of-service (application crash via an r_num_calc out-of-bounds read) by crafting an arm assembly input because a loop uses an incorrect index in armass.c and certain length validation is missing in armass64....
https://nvd.nist.gov/vuln/detail/CVE-2018-20457
243,350
radare2
e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7
Fix #12417/#12418 (arm assembler heap overflows)
0
ut32 armass_assemble(const char *str, ut64 off, int thumb) { int i, j; char buf[128]; ArmOpcode aop = {.off = off}; for (i = j = 0; i < sizeof (buf) - 1 && str[j]; i++, j++) { if (str[j] == '#') { i--; continue; } buf[i] = tolower ((const ut8)str[j]); } buf[i] = 0; arm_opcode_parse (&aop, buf); aop.off...
205,538,543,463,412,430,000,000,000,000,000,000,000
armass.c
51,560,072,340,479,960,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-20457
In radare2 through 3.1.3, the assemble function inside libr/asm/p/asm_arm_cs.c allows attackers to cause a denial-of-service (application crash via an r_num_calc out-of-bounds read) by crafting an arm assembly input because a loop uses an incorrect index in armass.c and certain length validation is missing in armass64....
https://nvd.nist.gov/vuln/detail/CVE-2018-20457
196,725
NetHack
612755bfb5c412079795c68ba392df5d93874ed8
https://github.com/NetHack/NetHack
https://github.com/NetHack/NetHack/commit/612755bfb5c412079795c68ba392df5d93874ed8
escapes() revamp Partial rewrite of escapes(), mostly changing its if-then-else logic so that end-of-string can be checked once instead for each case. The previous version had a bug if the input string ended with backslash and one decimal digit (due to being lumped together with the handling for trailing \X or \O...
1
escapes(cp, tp) const char *cp; char *tp; { while (*cp) { int cval = 0, meta = 0; if (*cp == '\\' && cp[1] && index("mM", cp[1]) && cp[2]) { meta = 1; cp += 2; } if (*cp == '\\' && cp[1] && index("0123456789xXoO", cp[1]) && cp[2]) { NEARDATA const char hex[] = "00112233445566778899aAbBcCdDeEfF"; ...
249,592,603,022,301,060,000,000,000,000,000,000,000
options.c
48,826,738,162,936,170,000,000,000,000,000,000,000
[ "CWE-269" ]
CVE-2020-5253
NetHack before version 3.6.0 allowed malicious use of escaping of characters in the configuration file (usually .nethackrc) which could be exploited. This bug is patched in NetHack 3.6.0.
https://nvd.nist.gov/vuln/detail/CVE-2020-5253
243,386
NetHack
612755bfb5c412079795c68ba392df5d93874ed8
https://github.com/NetHack/NetHack
https://github.com/NetHack/NetHack/commit/612755bfb5c412079795c68ba392df5d93874ed8
escapes() revamp Partial rewrite of escapes(), mostly changing its if-then-else logic so that end-of-string can be checked once instead for each case. The previous version had a bug if the input string ended with backslash and one decimal digit (due to being lumped together with the handling for trailing \X or \O...
0
escapes(cp, tp) const char *cp; char *tp; { static NEARDATA const char oct[] = "01234567", dec[] = "0123456789", hex[] = "00112233445566778899aAbBcCdDeEfF"; const char *dp; int cval, meta, dcount; while (*cp) { /* \M has to be followed by something to do meta conversion, otherwise it will just b...
336,445,687,602,323,400,000,000,000,000,000,000,000
options.c
276,274,058,757,988,200,000,000,000,000,000,000,000
[ "CWE-269" ]
CVE-2020-5253
NetHack before version 3.6.0 allowed malicious use of escaping of characters in the configuration file (usually .nethackrc) which could be exploited. This bug is patched in NetHack 3.6.0.
https://nvd.nist.gov/vuln/detail/CVE-2020-5253
196,731
gpac
00194f5fe462123f70b0bae7987317b52898b868
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/00194f5fe462123f70b0bae7987317b52898b868
fixed #1769 (fuzz)
1
static GF_Err gf_media_export_filters(GF_MediaExporter *dumper) { char *args, szSubArgs[1024], szExt[30]; GF_Filter *file_out, *reframer, *remux=NULL, *src_filter; GF_FilterSession *fsess; GF_Err e = GF_OK; u32 codec_id=0; u32 sample_count=0; Bool skip_write_filter = GF_FALSE; Bool ext_forced = GF_FALSE; Bool ...
211,222,235,132,607,380,000,000,000,000,000,000,000
media_export.c
241,155,962,394,577,800,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-32438
The gf_media_export_filters function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
https://nvd.nist.gov/vuln/detail/CVE-2021-32438
243,432
gpac
00194f5fe462123f70b0bae7987317b52898b868
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/00194f5fe462123f70b0bae7987317b52898b868
fixed #1769 (fuzz)
0
static GF_Err gf_media_export_filters(GF_MediaExporter *dumper) { char *args, szSubArgs[1024], szExt[30]; GF_Filter *file_out, *reframer, *remux=NULL, *src_filter; GF_FilterSession *fsess; GF_Err e = GF_OK; u32 codec_id=0; u32 sample_count=0; Bool skip_write_filter = GF_FALSE; Bool ext_forced = GF_FALSE; Bool ...
143,313,728,759,781,460,000,000,000,000,000,000,000
media_export.c
188,944,260,727,094,350,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-32438
The gf_media_export_filters function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
https://nvd.nist.gov/vuln/detail/CVE-2021-32438
196,769
inspircd
7b47de3c194f239c5fea09a0e49696c9af017d51
https://github.com/inspircd/inspircd
https://github.com/inspircd/inspircd/commit/7b47de3c194f239c5fea09a0e49696c9af017d51
Copy the silence flags when sending update notifications. This fixes a crash bug in the silence module on some versions of GCC.
1
SilenceMessage(const std::string& mask, const std::string& flags) : ClientProtocol::Message("SILENCE") { PushParam(mask); PushParamRef(flags); }
304,206,330,437,958,530,000,000,000,000,000,000,000
m_silence.cpp
264,684,620,566,870,600,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-20918
An issue was discovered in InspIRCd 3 before 3.1.0. The silence module contains a use after free vulnerability. This vulnerability can be used for remote crashing of an InspIRCd server by any user able to fully connect to a server.
https://nvd.nist.gov/vuln/detail/CVE-2019-20918
244,450
inspircd
7b47de3c194f239c5fea09a0e49696c9af017d51
https://github.com/inspircd/inspircd
https://github.com/inspircd/inspircd/commit/7b47de3c194f239c5fea09a0e49696c9af017d51
Copy the silence flags when sending update notifications. This fixes a crash bug in the silence module on some versions of GCC.
0
SilenceMessage(const std::string& mask, const std::string& flags) : ClientProtocol::Message("SILENCE") { PushParam(mask); PushParam(flags); }
263,570,149,186,995,500,000,000,000,000,000,000,000
m_silence.cpp
317,800,603,755,825,970,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-20918
An issue was discovered in InspIRCd 3 before 3.1.0. The silence module contains a use after free vulnerability. This vulnerability can be used for remote crashing of an InspIRCd server by any user able to fully connect to a server.
https://nvd.nist.gov/vuln/detail/CVE-2019-20918
196,780
gpac
2320eb73afba753b39b7147be91f7be7afc0eeb7
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7
fixed potential crash in TS - cf #1264
1
static void gf_m2ts_process_pmt(GF_M2TS_Demuxer *ts, GF_M2TS_SECTION_ES *pmt, GF_List *sections, u8 table_id, u16 ex_table_id, u8 version_number, u8 last_section_number, u32 status) { u32 info_length, pos, desc_len, evt_type, nb_es,i; u32 nb_sections; u32 data_size; u32 nb_hevc, nb_hevc_temp, nb_shvc, nb_shvc_temp,...
334,962,607,977,044,650,000,000,000,000,000,000,000
mpegts.c
210,194,444,994,797,430,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-19481
An issue was discovered in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid memory read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
https://nvd.nist.gov/vuln/detail/CVE-2020-19481
244,633
gpac
2320eb73afba753b39b7147be91f7be7afc0eeb7
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7
fixed potential crash in TS - cf #1264
0
static void gf_m2ts_process_pmt(GF_M2TS_Demuxer *ts, GF_M2TS_SECTION_ES *pmt, GF_List *sections, u8 table_id, u16 ex_table_id, u8 version_number, u8 last_section_number, u32 status) { u32 info_length, pos, desc_len, evt_type, nb_es,i; u32 nb_sections; u32 data_size; u32 nb_hevc, nb_hevc_temp, nb_shvc, nb_shvc_temp,...
112,537,723,025,633,120,000,000,000,000,000,000,000
mpegts.c
95,224,966,645,898,480,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-19481
An issue was discovered in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid memory read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
https://nvd.nist.gov/vuln/detail/CVE-2020-19481
196,785
hermes
86543ac47e59c522976b5632b8bf9a2a4583c7d2
https://github.com/facebook/hermes
https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2
Added stack overflow check for hermes::vm:: hermesBuiltinApply Summary: This adds a missing check for stack overflow. Reviewed By: tmikov Differential Revision: D20104955 fbshipit-source-id: 1f37e23d2e28ebcd3aa4176d134b8418e7059ebd
1
hermesBuiltinApply(void *, Runtime *runtime, NativeArgs args) { GCScopeMarkerRAII marker{runtime}; Handle<Callable> fn = args.dyncastArg<Callable>(0); if (LLVM_UNLIKELY(!fn)) { return runtime->raiseTypeErrorForValue( args.getArgHandle(0), " is not a function"); } Handle<JSArray> argArray = args....
174,575,542,735,395,060,000,000,000,000,000,000,000
HermesBuiltin.cpp
249,782,678,078,628,440,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-1896
A stack overflow vulnerability in Facebook Hermes 'builtin apply' prior to commit 86543ac47e59c522976b5632b8bf9a2a4583c7d2 (https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2) allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitabl...
https://nvd.nist.gov/vuln/detail/CVE-2020-1896
244,865
hermes
86543ac47e59c522976b5632b8bf9a2a4583c7d2
https://github.com/facebook/hermes
https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2
Added stack overflow check for hermes::vm:: hermesBuiltinApply Summary: This adds a missing check for stack overflow. Reviewed By: tmikov Differential Revision: D20104955 fbshipit-source-id: 1f37e23d2e28ebcd3aa4176d134b8418e7059ebd
0
hermesBuiltinApply(void *, Runtime *runtime, NativeArgs args) { GCScopeMarkerRAII marker{runtime}; Handle<Callable> fn = args.dyncastArg<Callable>(0); if (LLVM_UNLIKELY(!fn)) { return runtime->raiseTypeErrorForValue( args.getArgHandle(0), " is not a function"); } Handle<JSArray> argArray = args....
19,541,113,223,318,184,000,000,000,000,000,000,000
HermesBuiltin.cpp
177,450,344,062,382,070,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-1896
A stack overflow vulnerability in Facebook Hermes 'builtin apply' prior to commit 86543ac47e59c522976b5632b8bf9a2a4583c7d2 (https://github.com/facebook/hermes/commit/86543ac47e59c522976b5632b8bf9a2a4583c7d2) allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitabl...
https://nvd.nist.gov/vuln/detail/CVE-2020-1896
196,786
inspircd
6058483d9fbc1b904d5ae7cfea47bfcde5c5b559
https://github.com/inspircd/inspircd
https://github.com/inspircd/inspircd/commit/6058483d9fbc1b904d5ae7cfea47bfcde5c5b559
Reject replies to DNS PTR requests that contain invalid characters Fixes issue #1033 reported by @ping86
1
DNSResult DNS::GetResult() { /* Fetch dns query response and decide where it belongs */ DNSHeader header; DNSRequest *req; unsigned char buffer[sizeof(DNSHeader)]; irc::sockets::sockaddrs from; memset(&from, 0, sizeof(from)); socklen_t x = sizeof(from); int length = ServerInstance->SE->RecvFrom(this, (char*)bu...
328,794,676,900,590,780,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2015-8702
The DNS::GetResult function in dns.cpp in InspIRCd before 2.0.19 allows remote DNS servers to cause a denial of service (netsplit) via an invalid character in a PTR response, as demonstrated by a "\032" (whitespace) character in a hostname.
https://nvd.nist.gov/vuln/detail/CVE-2015-8702
244,876
inspircd
6058483d9fbc1b904d5ae7cfea47bfcde5c5b559
https://github.com/inspircd/inspircd
https://github.com/inspircd/inspircd/commit/6058483d9fbc1b904d5ae7cfea47bfcde5c5b559
Reject replies to DNS PTR requests that contain invalid characters Fixes issue #1033 reported by @ping86
0
DNSResult DNS::GetResult() { /* Fetch dns query response and decide where it belongs */ DNSHeader header; DNSRequest *req; unsigned char buffer[sizeof(DNSHeader)]; irc::sockets::sockaddrs from; memset(&from, 0, sizeof(from)); socklen_t x = sizeof(from); int length = ServerInstance->SE->RecvFrom(this, (char*)bu...
217,431,057,955,344,570,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2015-8702
The DNS::GetResult function in dns.cpp in InspIRCd before 2.0.19 allows remote DNS servers to cause a denial of service (netsplit) via an invalid character in a PTR response, as demonstrated by a "\032" (whitespace) character in a hostname.
https://nvd.nist.gov/vuln/detail/CVE-2015-8702
196,804
tensorflow
5117e0851348065ed59c991562c0ec80d9193db2
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2
Prevent a division by 0 PiperOrigin-RevId: 371007407 Change-Id: Iecf2718de48d6bf5a69b02a9df9deda8ec1b19d3
1
TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) { TfLiteTensor* output; TF_LITE_ENSURE_OK(context, GetOutputSafe(context, node, 0, &output)); TfLiteTensor* hits; TF_LITE_ENSURE_OK(context, GetOutputSafe(context, node, 1, &hits)); const TfLiteTensor* lookup; TF_LITE_ENSURE_OK(context, GetInputSaf...
150,447,043,883,207,820,000,000,000,000,000,000,000
hashtable_lookup.cc
190,145,104,546,114,450,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2021-29604
TensorFlow is an end-to-end open source platform for machine learning. The TFLite implementation of hashtable lookup is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/hashtable_lookup.cc#L114-L115) An attacker can cra...
https://nvd.nist.gov/vuln/detail/CVE-2021-29604
245,448
tensorflow
5117e0851348065ed59c991562c0ec80d9193db2
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2
Prevent a division by 0 PiperOrigin-RevId: 371007407 Change-Id: Iecf2718de48d6bf5a69b02a9df9deda8ec1b19d3
0
TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) { TfLiteTensor* output; TF_LITE_ENSURE_OK(context, GetOutputSafe(context, node, 0, &output)); TfLiteTensor* hits; TF_LITE_ENSURE_OK(context, GetOutputSafe(context, node, 1, &hits)); const TfLiteTensor* lookup; TF_LITE_ENSURE_OK(context, GetInputSaf...
290,289,615,680,126,660,000,000,000,000,000,000,000
hashtable_lookup.cc
198,472,356,523,581,000,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2021-29604
TensorFlow is an end-to-end open source platform for machine learning. The TFLite implementation of hashtable lookup is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/hashtable_lookup.cc#L114-L115) An attacker can cra...
https://nvd.nist.gov/vuln/detail/CVE-2021-29604
196,814
android-gif-drawable
cc5b4f8e43463995a84efd594f89a21f906c2d20
https://github.com/koral--/android-gif-drawable
https://github.com/koral--/android-gif-drawable/commit/cc5b4f8e43463995a84efd594f89a21f906c2d20
Do not realloc array if new raster size is 0. if realloc() is called with 0 size it may return NULL and this will be incorrectly handled as not enough memory and (also) rasterBits will be freed by realloc but we will not update it.
1
void DDGifSlurp(GifInfo *info, bool decode, bool exitAfterFrame) { GifRecordType RecordType; GifByteType *ExtData; int ExtFunction; GifFileType *gifFilePtr; gifFilePtr = info->gifFilePtr; uint_fast32_t lastAllocatedGCBIndex = 0; do { if (DGifGetRecordType(gifFilePtr, &RecordType) == GIF_ERROR) { break; } ...
150,482,942,074,607,440,000,000,000,000,000,000,000
decoding.c
142,499,988,501,680,500,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2019-11932
A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is ...
https://nvd.nist.gov/vuln/detail/CVE-2019-11932
245,684
android-gif-drawable
cc5b4f8e43463995a84efd594f89a21f906c2d20
https://github.com/koral--/android-gif-drawable
https://github.com/koral--/android-gif-drawable/commit/cc5b4f8e43463995a84efd594f89a21f906c2d20
Do not realloc array if new raster size is 0. if realloc() is called with 0 size it may return NULL and this will be incorrectly handled as not enough memory and (also) rasterBits will be freed by realloc but we will not update it.
0
void DDGifSlurp(GifInfo *info, bool decode, bool exitAfterFrame) { GifRecordType RecordType; GifByteType *ExtData; int ExtFunction; GifFileType *gifFilePtr; gifFilePtr = info->gifFilePtr; uint_fast32_t lastAllocatedGCBIndex = 0; do { if (DGifGetRecordType(gifFilePtr, &RecordType) == GIF_ERROR) { break; } ...
263,262,452,258,428,470,000,000,000,000,000,000,000
decoding.c
320,805,815,679,680,400,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2019-11932
A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is ...
https://nvd.nist.gov/vuln/detail/CVE-2019-11932
196,824
fbthrift
01686e15ec77ccb4d49a77d5bce3a01601e54d64
https://github.com/facebook/fbthrift
https://github.com/facebook/fbthrift/commit/01686e15ec77ccb4d49a77d5bce3a01601e54d64
Throw on skipping an invalid type. Summary: Certain values (e.g.) T_STOP should not appear as a skip type. Allowing them to can cause thrift to loop unboundedly. Reviewed By: spalamarchuk Differential Revision: D15102451 fbshipit-source-id: c08d52f44f37e9c212d3480233ac217105586c9f
1
uint32_t skip(Protocol_& prot, TType arg_type) { switch (arg_type) { case T_BOOL: { bool boolv; return prot.readBool(boolv); } case T_BYTE: { int8_t bytev = 0; return prot.readByte(bytev); } case T_I16: { int16_t i16; return prot.readI16(i16); } case T_I...
202,632,401,772,921,150,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2019-3565
Legacy C++ Facebook Thrift servers (using cpp instead of cpp2) would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Fa...
https://nvd.nist.gov/vuln/detail/CVE-2019-3565
245,840
fbthrift
01686e15ec77ccb4d49a77d5bce3a01601e54d64
https://github.com/facebook/fbthrift
https://github.com/facebook/fbthrift/commit/01686e15ec77ccb4d49a77d5bce3a01601e54d64
Throw on skipping an invalid type. Summary: Certain values (e.g.) T_STOP should not appear as a skip type. Allowing them to can cause thrift to loop unboundedly. Reviewed By: spalamarchuk Differential Revision: D15102451 fbshipit-source-id: c08d52f44f37e9c212d3480233ac217105586c9f
0
uint32_t skip(Protocol_& prot, TType arg_type) { switch (arg_type) { case T_BOOL: { bool boolv; return prot.readBool(boolv); } case T_BYTE: { int8_t bytev = 0; return prot.readByte(bytev); } case T_I16: { int16_t i16; return prot.readI16(i16); } case T_I...
38,847,050,272,875,900,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2019-3565
Legacy C++ Facebook Thrift servers (using cpp instead of cpp2) would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Fa...
https://nvd.nist.gov/vuln/detail/CVE-2019-3565
196,840
open5gs
d919b2744cd05abae043490f0a3dd1946c1ccb8c
https://github.com/open5gs/open5gs
https://github.com/open5gs/open5gs/commit/d919b2744cd05abae043490f0a3dd1946c1ccb8c
[AMF] fix the memory problem (#1247) 1. memory corruption - Overflow num_of_part in SBI message 2. null pointer dereference - n2InfoContent->ngap_ie_type
1
int amf_namf_comm_handle_n1_n2_message_transfer( ogs_sbi_stream_t *stream, ogs_sbi_message_t *recvmsg) { int status; amf_ue_t *amf_ue = NULL; amf_sess_t *sess = NULL; ogs_pkbuf_t *n1buf = NULL; ogs_pkbuf_t *n2buf = NULL; ogs_pkbuf_t *gmmbuf = NULL; ogs_pkbuf_t *ngapbuf = NULL; ...
129,190,863,934,746,430,000,000,000,000,000,000,000
namf-handler.c
141,133,654,398,179,800,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-44109
A buffer overflow in lib/sbi/message.c in Open5GS 2.3.6 and earlier allows remote attackers to Denial of Service via a crafted sbi request.
https://nvd.nist.gov/vuln/detail/CVE-2021-44109
246,212
open5gs
d919b2744cd05abae043490f0a3dd1946c1ccb8c
https://github.com/open5gs/open5gs
https://github.com/open5gs/open5gs/commit/d919b2744cd05abae043490f0a3dd1946c1ccb8c
[AMF] fix the memory problem (#1247) 1. memory corruption - Overflow num_of_part in SBI message 2. null pointer dereference - n2InfoContent->ngap_ie_type
0
int amf_namf_comm_handle_n1_n2_message_transfer( ogs_sbi_stream_t *stream, ogs_sbi_message_t *recvmsg) { int status; amf_ue_t *amf_ue = NULL; amf_sess_t *sess = NULL; ogs_pkbuf_t *n1buf = NULL; ogs_pkbuf_t *n2buf = NULL; ogs_pkbuf_t *gmmbuf = NULL; ogs_pkbuf_t *ngapbuf = NULL; ...
309,731,415,351,503,100,000,000,000,000,000,000,000
namf-handler.c
281,254,282,341,428,130,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-44109
A buffer overflow in lib/sbi/message.c in Open5GS 2.3.6 and earlier allows remote attackers to Denial of Service via a crafted sbi request.
https://nvd.nist.gov/vuln/detail/CVE-2021-44109
196,847
gpac
55a183e6b8602369c04ea3836e05436a79fbc7f8
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/55a183e6b8602369c04ea3836e05436a79fbc7f8
fixed #2153
1
GF_Err gf_bifs_dec_sf_field(GF_BifsDecoder * codec, GF_BitStream *bs, GF_Node *node, GF_FieldInfo *field, Bool is_mem_com) { GF_Err e; GF_Node *new_node; u32 size, length, w, h, i; char *buffer; //blindly call unquantize. return is OK, error or GF_EOS if (codec->ActiveQP && node) { e = gf_bifs_dec_unquant_fiel...
195,543,721,095,647,000,000,000,000,000,000,000,000
field_decode.c
265,454,266,624,884,420,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2022-1172
Null Pointer Dereference Caused Segmentation Fault in GitHub repository gpac/gpac prior to 2.1.0-DEV.
https://nvd.nist.gov/vuln/detail/CVE-2022-1172
246,506
gpac
55a183e6b8602369c04ea3836e05436a79fbc7f8
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/55a183e6b8602369c04ea3836e05436a79fbc7f8
fixed #2153
0
GF_Err gf_bifs_dec_sf_field(GF_BifsDecoder * codec, GF_BitStream *bs, GF_Node *node, GF_FieldInfo *field, Bool is_mem_com) { GF_Err e; GF_Node *new_node; u32 size, length, w, h, i; char *buffer; //blindly call unquantize. return is OK, error or GF_EOS if (codec->ActiveQP && node) { e = gf_bifs_dec_unquant_fiel...
186,523,521,865,975,600,000,000,000,000,000,000,000
field_decode.c
151,388,572,550,638,560,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2022-1172
Null Pointer Dereference Caused Segmentation Fault in GitHub repository gpac/gpac prior to 2.1.0-DEV.
https://nvd.nist.gov/vuln/detail/CVE-2022-1172
196,862
FFmpeg
b0a8b40294ea212c1938348ff112ef1b9bf16bb3
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3
avcodec/exr: skip bottom clearing loop when its outside the image Fixes: signed integer overflow: 1633771809 * 32960 cannot be represented in type 'int' Fixes: 26532/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_EXR_fuzzer-5613925708857344 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tr...
1
static int decode_frame(AVCodecContext *avctx, void *data, int *got_frame, AVPacket *avpkt) { EXRContext *s = avctx->priv_data; ThreadFrame frame = { .f = data }; AVFrame *picture = data; uint8_t *ptr; int i, y, ret, ymax; int planes; int out_line_size; int nb_bl...
61,000,637,100,548,170,000,000,000,000,000,000,000
exr.c
49,942,830,372,792,630,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-35965
decode_frame in libavcodec/exr.c in FFmpeg 4.3.1 has an out-of-bounds write because of errors in calculations of when to perform memset zero operations.
https://nvd.nist.gov/vuln/detail/CVE-2020-35965
246,769
FFmpeg
b0a8b40294ea212c1938348ff112ef1b9bf16bb3
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/b0a8b40294ea212c1938348ff112ef1b9bf16bb3
avcodec/exr: skip bottom clearing loop when its outside the image Fixes: signed integer overflow: 1633771809 * 32960 cannot be represented in type 'int' Fixes: 26532/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_EXR_fuzzer-5613925708857344 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tr...
0
static int decode_frame(AVCodecContext *avctx, void *data, int *got_frame, AVPacket *avpkt) { EXRContext *s = avctx->priv_data; ThreadFrame frame = { .f = data }; AVFrame *picture = data; uint8_t *ptr; int i, y, ret, ymax; int planes; int out_line_size; int nb_bl...
212,360,480,020,348,240,000,000,000,000,000,000,000
exr.c
143,723,358,461,478,950,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-35965
decode_frame in libavcodec/exr.c in FFmpeg 4.3.1 has an out-of-bounds write because of errors in calculations of when to perform memset zero operations.
https://nvd.nist.gov/vuln/detail/CVE-2020-35965
196,863
ImageMagick
13267a10845a8dadabed63072b537f050cec6daa
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/13267a10845a8dadabed63072b537f050cec6daa
Changed the JPEG writer to raise a warning when the exif profile exceeds 65533 bytes and truncate it.
1
static void WriteProfile(j_compress_ptr jpeg_info,Image *image) { const char *name; const StringInfo *profile; MagickBooleanType iptc; register ssize_t i; size_t length, tag_length; StringInfo *custom_profile; /* Save image profile as a APP marker. */ iptc=MagickF...
37,118,065,200,137,287,000,000,000,000,000,000,000
jpeg.c
88,998,279,270,214,160,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2016-10052
Buffer overflow in the WriteProfile function in coders/jpeg.c in ImageMagick before 6.9.5-6 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10052
246,778
ImageMagick
13267a10845a8dadabed63072b537f050cec6daa
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/13267a10845a8dadabed63072b537f050cec6daa
Changed the JPEG writer to raise a warning when the exif profile exceeds 65533 bytes and truncate it.
0
static void WriteProfile(j_compress_ptr jpeg_info,Image *image, ExceptionInfo *exception) { const char *name; const StringInfo *profile; MagickBooleanType iptc; register ssize_t i; size_t length, tag_length; StringInfo *custom_profile; /* Save image profile as a APP...
66,114,314,573,460,830,000,000,000,000,000,000,000
jpeg.c
327,209,937,172,551,450,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2016-10052
Buffer overflow in the WriteProfile function in coders/jpeg.c in ImageMagick before 6.9.5-6 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10052
196,872
winscp
49d876f2c5fc00bcedaa986a7cf6dedd6bf16f54
https://github.com/winscp/winscp
https://github.com/winscp/winscp/commit/49d876f2c5fc00bcedaa986a7cf6dedd6bf16f54
Bug 1675: Prevent SCP server sending files that were not requested https://winscp.net/tracker/1675 Source commit: 4aa587620973bf793fb6e783052277c0f7be4b55
1
void __fastcall TSCPFileSystem::SCPSink(const UnicodeString TargetDir, const UnicodeString FileName, const UnicodeString SourceDir, const TCopyParamType * CopyParam, bool & Success, TFileOperationProgressType * OperationProgress, int Params, int Level) { struct { int SetTime; TDateTime Modi...
161,338,198,425,055,810,000,000,000,000,000,000,000
ScpFileSystem.cpp
46,647,030,378,103,760,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20684
In WinSCP before 5.14 beta, due to missing validation, the scp implementation would accept arbitrary files sent by the server, potentially overwriting unrelated files. This affects TSCPFileSystem::SCPSink in core/ScpFileSystem.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2018-20684
246,939
winscp
49d876f2c5fc00bcedaa986a7cf6dedd6bf16f54
https://github.com/winscp/winscp
https://github.com/winscp/winscp/commit/49d876f2c5fc00bcedaa986a7cf6dedd6bf16f54
Bug 1675: Prevent SCP server sending files that were not requested https://winscp.net/tracker/1675 Source commit: 4aa587620973bf793fb6e783052277c0f7be4b55
0
void __fastcall TSCPFileSystem::SCPSink(const UnicodeString TargetDir, const UnicodeString FileName, const UnicodeString SourceDir, const TCopyParamType * CopyParam, bool & Success, TFileOperationProgressType * OperationProgress, int Params, int Level) { struct { int SetTime; TDateTime Modi...
324,511,619,249,502,660,000,000,000,000,000,000,000
ScpFileSystem.cpp
1,443,874,472,268,286,500,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20684
In WinSCP before 5.14 beta, due to missing validation, the scp implementation would accept arbitrary files sent by the server, potentially overwriting unrelated files. This affects TSCPFileSystem::SCPSink in core/ScpFileSystem.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2018-20684
196,881
tensorflow
b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d
Prevent division by 0 PiperOrigin-RevId: 370998952 Change-Id: I6b1d49079624ee1447d2d9b53a8976fb356cc8f5
1
TfLiteStatus ResizeOutputTensors(TfLiteContext* context, TfLiteNode* node, const TfLiteTensor* axis, const TfLiteTensor* input, int num_splits) { int axis_value = GetTensorData<int>(axis)[0]; if (axis_value < 0) { axis_value += NumDimensions(inpu...
331,934,852,386,619,300,000,000,000,000,000,000,000
split.cc
222,200,902,758,696,620,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-29599
TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `Split` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/e2752089ef7ce9bcf3db0ec618ebd23ea119d0c7/tensorflow/lite/kernels/split.cc#L63-L65). An attacker can craft a mod...
https://nvd.nist.gov/vuln/detail/CVE-2021-29599
247,073
tensorflow
b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d
Prevent division by 0 PiperOrigin-RevId: 370998952 Change-Id: I6b1d49079624ee1447d2d9b53a8976fb356cc8f5
0
TfLiteStatus ResizeOutputTensors(TfLiteContext* context, TfLiteNode* node, const TfLiteTensor* axis, const TfLiteTensor* input, int num_splits) { int axis_value = GetTensorData<int>(axis)[0]; if (axis_value < 0) { axis_value += NumDimensions(inpu...
256,662,144,583,757,840,000,000,000,000,000,000,000
split.cc
15,669,385,354,856,113,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-29599
TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `Split` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/e2752089ef7ce9bcf3db0ec618ebd23ea119d0c7/tensorflow/lite/kernels/split.cc#L63-L65). An attacker can craft a mod...
https://nvd.nist.gov/vuln/detail/CVE-2021-29599
196,917
opencv
d1615ba11a93062b1429fce9f0f638d1572d3418
https://github.com/opencv/opencv
https://github.com/opencv/opencv/commit/d1615ba11a93062b1429fce9f0f638d1572d3418
video:fixed DISOpticalFlow segfault from small img
1
void DISOpticalFlowImpl::calc(InputArray I0, InputArray I1, InputOutputArray flow) { CV_Assert(!I0.empty() && I0.depth() == CV_8U && I0.channels() == 1); CV_Assert(!I1.empty() && I1.depth() == CV_8U && I1.channels() == 1); CV_Assert(I0.sameSize(I1)); CV_Assert(I0.isContinuous()); CV_Assert(I1.isCont...
325,450,862,465,696,100,000,000,000,000,000,000,000
dis_flow.cpp
38,818,151,150,903,870,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2019-19624
An out-of-bounds read was discovered in OpenCV before 4.1.1. Specifically, variable coarsest_scale is assumed to be greater than or equal to finest_scale within the calc()/ocl_calc() functions in dis_flow.cpp. However, this is not true when dealing with small images, leading to an out-of-bounds read of the heap-allocat...
https://nvd.nist.gov/vuln/detail/CVE-2019-19624
248,173
opencv
d1615ba11a93062b1429fce9f0f638d1572d3418
https://github.com/opencv/opencv
https://github.com/opencv/opencv/commit/d1615ba11a93062b1429fce9f0f638d1572d3418
video:fixed DISOpticalFlow segfault from small img
0
void DISOpticalFlowImpl::calc(InputArray I0, InputArray I1, InputOutputArray flow) { CV_Assert(!I0.empty() && I0.depth() == CV_8U && I0.channels() == 1); CV_Assert(!I1.empty() && I1.depth() == CV_8U && I1.channels() == 1); CV_Assert(I0.sameSize(I1)); CV_Assert(I0.isContinuous()); CV_Assert(I1.isCont...
105,699,457,377,157,900,000,000,000,000,000,000,000
dis_flow.cpp
252,275,051,152,586,820,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2019-19624
An out-of-bounds read was discovered in OpenCV before 4.1.1. Specifically, variable coarsest_scale is assumed to be greater than or equal to finest_scale within the calc()/ocl_calc() functions in dis_flow.cpp. However, this is not true when dealing with small images, leading to an out-of-bounds read of the heap-allocat...
https://nvd.nist.gov/vuln/detail/CVE-2019-19624
196,918
opencv
d1615ba11a93062b1429fce9f0f638d1572d3418
https://github.com/opencv/opencv
https://github.com/opencv/opencv/commit/d1615ba11a93062b1429fce9f0f638d1572d3418
video:fixed DISOpticalFlow segfault from small img
1
bool DISOpticalFlowImpl::ocl_calc(InputArray I0, InputArray I1, InputOutputArray flow) { UMat I0Mat = I0.getUMat(); UMat I1Mat = I1.getUMat(); bool use_input_flow = false; if (flow.sameSize(I0) && flow.depth() == CV_32F && flow.channels() == 2) use_input_flow = true; else flow.create...
317,184,864,454,707,200,000,000,000,000,000,000,000
dis_flow.cpp
38,818,151,150,903,870,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2019-19624
An out-of-bounds read was discovered in OpenCV before 4.1.1. Specifically, variable coarsest_scale is assumed to be greater than or equal to finest_scale within the calc()/ocl_calc() functions in dis_flow.cpp. However, this is not true when dealing with small images, leading to an out-of-bounds read of the heap-allocat...
https://nvd.nist.gov/vuln/detail/CVE-2019-19624
248,172
opencv
d1615ba11a93062b1429fce9f0f638d1572d3418
https://github.com/opencv/opencv
https://github.com/opencv/opencv/commit/d1615ba11a93062b1429fce9f0f638d1572d3418
video:fixed DISOpticalFlow segfault from small img
0
bool DISOpticalFlowImpl::ocl_calc(InputArray I0, InputArray I1, InputOutputArray flow) { UMat I0Mat = I0.getUMat(); UMat I1Mat = I1.getUMat(); bool use_input_flow = false; if (flow.sameSize(I0) && flow.depth() == CV_32F && flow.channels() == 2) use_input_flow = true; else flow.create...
144,233,703,505,522,000,000,000,000,000,000,000,000
dis_flow.cpp
252,275,051,152,586,820,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2019-19624
An out-of-bounds read was discovered in OpenCV before 4.1.1. Specifically, variable coarsest_scale is assumed to be greater than or equal to finest_scale within the calc()/ocl_calc() functions in dis_flow.cpp. However, this is not true when dealing with small images, leading to an out-of-bounds read of the heap-allocat...
https://nvd.nist.gov/vuln/detail/CVE-2019-19624
196,922
tensorflow
ea50a40e84f6bff15a0912728e35b657548cef11
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/ea50a40e84f6bff15a0912728e35b657548cef11
Fix failed check in SparseTensorToCSRSparseMatrix Security vulnerability fix. A `CHECK` fails if inputing either an empty `dense_shape`, or a non-rank-2 `indices`. Added appropriate checks and tests. PiperOrigin-RevId: 446053984
1
void Compute(OpKernelContext* ctx) final { const Tensor& indices = ctx->input(0); const Tensor& values = ctx->input(1); const Tensor& dense_shape = ctx->input(2); const int rank = dense_shape.NumElements(); OP_REQUIRES(ctx, rank == 2 || rank == 3, errors::InvalidArgument("SparseTen...
197,596,152,635,651,330,000,000,000,000,000,000,000
sparse_tensor_to_csr_sparse_matrix_op.cc
107,330,599,934,320,900,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-29198
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SparseTensorToCSRSparseMatrix` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code ...
https://nvd.nist.gov/vuln/detail/CVE-2022-29198
248,337
tensorflow
ea50a40e84f6bff15a0912728e35b657548cef11
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/ea50a40e84f6bff15a0912728e35b657548cef11
Fix failed check in SparseTensorToCSRSparseMatrix Security vulnerability fix. A `CHECK` fails if inputing either an empty `dense_shape`, or a non-rank-2 `indices`. Added appropriate checks and tests. PiperOrigin-RevId: 446053984
0
void Compute(OpKernelContext* ctx) final { const Tensor& indices = ctx->input(0); const Tensor& values = ctx->input(1); const Tensor& dense_shape = ctx->input(2); const int rank = dense_shape.NumElements(); OP_REQUIRES( ctx, TensorShapeUtils::IsVector(dense_shape.shape()), errors::...
171,379,670,951,783,640,000,000,000,000,000,000,000
sparse_tensor_to_csr_sparse_matrix_op.cc
166,764,023,293,945,800,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-29198
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SparseTensorToCSRSparseMatrix` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code ...
https://nvd.nist.gov/vuln/detail/CVE-2022-29198
196,924
tensorflow
e6340f0665d53716ef3197ada88936c2a5f7a2d3
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/e6340f0665d53716ef3197ada88936c2a5f7a2d3
Handle a special grappler case resulting in crash. It might happen that a malformed input could be used to trick Grappler into trying to optimize a node with no inputs. This, in turn, would produce a null pointer dereference and a segfault. PiperOrigin-RevId: 369242852 Change-Id: I2e5cbe7aec243d34a6d60220ac8ac9b16f13...
1
Status TrySimplify(NodeDef* consumer, string* simplified_node_name) override { NodeDef* producer; TF_RETURN_IF_ERROR(GetInputNode(consumer->input(0), &producer)); const bool producer_is_cast = IsCastLike(*producer); const bool can_optimize = !IsCheckNumerics(*producer) && ((producer_is...
204,527,200,722,295,960,000,000,000,000,000,000,000
arithmetic_optimizer.cc
251,818,740,065,180,880,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-29616
TensorFlow is an end-to-end open source platform for machine learning. The implementation of TrySimplify(https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/grappler/optimizers/arithmetic_optimizer.cc#L390-L401) has undefined behavior due to dereferencing a null pointe...
https://nvd.nist.gov/vuln/detail/CVE-2021-29616
248,381
tensorflow
e6340f0665d53716ef3197ada88936c2a5f7a2d3
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/e6340f0665d53716ef3197ada88936c2a5f7a2d3
Handle a special grappler case resulting in crash. It might happen that a malformed input could be used to trick Grappler into trying to optimize a node with no inputs. This, in turn, would produce a null pointer dereference and a segfault. PiperOrigin-RevId: 369242852 Change-Id: I2e5cbe7aec243d34a6d60220ac8ac9b16f13...
0
Status TrySimplify(NodeDef* consumer, string* simplified_node_name) override { NodeDef* producer; if (consumer->input_size() < 1) { return errors::FailedPrecondition("Node ", simplified_node_name, " lacks inputs"); } TF_RETURN_IF_ERROR(GetInputNode(consu...
178,924,406,196,793,520,000,000,000,000,000,000,000
arithmetic_optimizer.cc
339,917,451,426,958,500,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-29616
TensorFlow is an end-to-end open source platform for machine learning. The implementation of TrySimplify(https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/grappler/optimizers/arithmetic_optimizer.cc#L390-L401) has undefined behavior due to dereferencing a null pointe...
https://nvd.nist.gov/vuln/detail/CVE-2021-29616
196,936
libmysofa
2e6fac6ab6156dae8e8c6f417741388084b70d6f
https://github.com/hoene/libmysofa
https://github.com/hoene/libmysofa/commit/2e6fac6ab6156dae8e8c6f417741388084b70d6f
Fixed recursive function calls
1
static int directblockRead(struct READER *reader, struct DATAOBJECT *dataobject, struct FRACTALHEAP *fractalheap) { char buf[4], *name, *value; int size, offset_size, length_size, err, len; uint8_t typeandversion; uint64_t unknown, heap_header_address, block_offset, block_size, offset, length; long store; s...
194,147,979,693,446,200,000,000,000,000,000,000,000
fractalhead.c
304,011,301,597,710,720,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-20016
libmysofa before 2019-11-24 does not properly restrict recursive function calls, as demonstrated by reports of stack consumption in readOHDRHeaderMessageDatatype in dataobject.c and directblockRead in fractalhead.c. NOTE: a download of v0.9 after 2019-12-06 should fully remediate this issue.
https://nvd.nist.gov/vuln/detail/CVE-2019-20016
248,728
libmysofa
2e6fac6ab6156dae8e8c6f417741388084b70d6f
https://github.com/hoene/libmysofa
https://github.com/hoene/libmysofa/commit/2e6fac6ab6156dae8e8c6f417741388084b70d6f
Fixed recursive function calls
0
static int directblockRead(struct READER *reader, struct DATAOBJECT *dataobject, struct FRACTALHEAP *fractalheap) { char buf[4], *name, *value; int size, offset_size, length_size, err, len; uint8_t typeandversion; uint64_t unknown, heap_header_address, block_offset, block_size, offset, length; long store; s...
28,560,801,298,190,365,000,000,000,000,000,000,000
fractalhead.c
19,957,013,343,427,520,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-20016
libmysofa before 2019-11-24 does not properly restrict recursive function calls, as demonstrated by reports of stack consumption in readOHDRHeaderMessageDatatype in dataobject.c and directblockRead in fractalhead.c. NOTE: a download of v0.9 after 2019-12-06 should fully remediate this issue.
https://nvd.nist.gov/vuln/detail/CVE-2019-20016
196,943
deark
287f5ac31dfdc074669182f51ece637706070eeb
https://github.com/jsummers/deark
https://github.com/jsummers/deark/commit/287f5ac31dfdc074669182f51ece637706070eeb
pict: Fixed a bug with ICC profile extraction Could cause a NULL pointer dereference. Found by F. Çelik.
1
static void do_iccprofile_item(deark *c, lctx *d, i64 pos, i64 len) { i64 selector; i64 data_len; if(len<4) return; selector = de_getu32be(pos); data_len = len-4; de_dbg(c, "ICC profile segment, selector=%d, data len=%d", (int)selector, (int)data_len); if(selector!=1) { // If this is not a Continuation seg...
40,975,817,692,116,526,000,000,000,000,000,000,000
pict.c
321,838,767,434,444,900,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-28855
In Deark before 1.5.8, a specially crafted input file can cause a NULL pointer dereference in the dbuf_write function (src/deark-dbuf.c).
https://nvd.nist.gov/vuln/detail/CVE-2021-28855
248,852
deark
287f5ac31dfdc074669182f51ece637706070eeb
https://github.com/jsummers/deark
https://github.com/jsummers/deark/commit/287f5ac31dfdc074669182f51ece637706070eeb
pict: Fixed a bug with ICC profile extraction Could cause a NULL pointer dereference. Found by F. Çelik.
0
static void do_iccprofile_item(deark *c, lctx *d, i64 pos, i64 len) { i64 selector; i64 data_len; if(len<4) return; selector = de_getu32be(pos); data_len = len-4; de_dbg(c, "ICC profile segment, selector=%d, data len=%d", (int)selector, (int)data_len); if(selector!=1) { // If this is not a Continuation seg...
79,538,085,167,000,470,000,000,000,000,000,000,000
pict.c
158,066,697,177,162,210,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-28855
In Deark before 1.5.8, a specially crafted input file can cause a NULL pointer dereference in the dbuf_write function (src/deark-dbuf.c).
https://nvd.nist.gov/vuln/detail/CVE-2021-28855
196,944
ImageMagick
307fa45d512641fcd105f0d57ca50c1437cd1b81
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/307fa45d512641fcd105f0d57ca50c1437cd1b81
https://github.com/ImageMagick/ImageMagick/issues/542
1
static Image *ReadOneMNGImage(MngInfo* mng_info, const ImageInfo *image_info, ExceptionInfo *exception) { char page_geometry[MagickPathExtent]; Image *image; MagickBooleanType logging; volatile int first_mng_object, object_id, term_chunk_found, skip_to_iend; volatile ssize...
186,675,766,236,936,280,000,000,000,000,000,000,000
png.c
323,382,477,396,108,700,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-12640
ImageMagick 7.0.6-1 has an out-of-bounds read vulnerability in ReadOneMNGImage in coders/png.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12640
248,870
ImageMagick
307fa45d512641fcd105f0d57ca50c1437cd1b81
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/307fa45d512641fcd105f0d57ca50c1437cd1b81
https://github.com/ImageMagick/ImageMagick/issues/542
0
static Image *ReadOneMNGImage(MngInfo* mng_info, const ImageInfo *image_info, ExceptionInfo *exception) { char page_geometry[MagickPathExtent]; Image *image; MagickBooleanType logging; volatile int first_mng_object, object_id, term_chunk_found, skip_to_iend; volatile ssize...
213,059,461,435,564,030,000,000,000,000,000,000,000
png.c
228,033,773,830,255,870,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-12640
ImageMagick 7.0.6-1 has an out-of-bounds read vulnerability in ReadOneMNGImage in coders/png.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12640
196,987
GameNetworkingSockets
d944a10808891d202bb1d5e1998de6e0423af678
https://github.com/ValveSoftware/GameNetworkingSockets
https://github.com/ValveSoftware/GameNetworkingSockets/commit/d944a10808891d202bb1d5e1998de6e0423af678
Tweak pointer math to avoid possible integer overflow
1
void CConnectionTransportUDPBase::Received_Data( const uint8 *pPkt, int cbPkt, SteamNetworkingMicroseconds usecNow ) { if ( cbPkt < sizeof(UDPDataMsgHdr) ) { ReportBadUDPPacketFromConnectionPeer( "DataPacket", "Packet of size %d is too small.", cbPkt ); return; } // Check cookie const UDPDataMsgHdr *hdr = (c...
122,503,328,740,501,540,000,000,000,000,000,000,000
steamnetworkingsockets_udp.cpp
65,779,715,295,261,640,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-6019
Valve's Game Networking Sockets prior to version v1.2.0 improperly handles inlined statistics messages in function CConnectionTransportUDPBase::Received_Data(), leading to an exception thrown from libprotobuf and resulting in a crash.
https://nvd.nist.gov/vuln/detail/CVE-2020-6019
249,339
GameNetworkingSockets
d944a10808891d202bb1d5e1998de6e0423af678
https://github.com/ValveSoftware/GameNetworkingSockets
https://github.com/ValveSoftware/GameNetworkingSockets/commit/d944a10808891d202bb1d5e1998de6e0423af678
Tweak pointer math to avoid possible integer overflow
0
void CConnectionTransportUDPBase::Received_Data( const uint8 *pPkt, int cbPkt, SteamNetworkingMicroseconds usecNow ) { if ( cbPkt < sizeof(UDPDataMsgHdr) ) { ReportBadUDPPacketFromConnectionPeer( "DataPacket", "Packet of size %d is too small.", cbPkt ); return; } // Check cookie const UDPDataMsgHdr *hdr = (c...
3,143,644,977,558,350,500,000,000,000,000,000,000
steamnetworkingsockets_udp.cpp
314,863,423,454,612,500,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-6019
Valve's Game Networking Sockets prior to version v1.2.0 improperly handles inlined statistics messages in function CConnectionTransportUDPBase::Received_Data(), leading to an exception thrown from libprotobuf and resulting in a crash.
https://nvd.nist.gov/vuln/detail/CVE-2020-6019
196,994
Pillow
893a40850c2d5da41537958e40569c029a6e127b
https://github.com/python-pillow/Pillow
https://github.com/python-pillow/Pillow/commit/893a40850c2d5da41537958e40569c029a6e127b
FLI overflow error fix and testcase CVE-2016-0775
1
ImagingFliDecode(Imaging im, ImagingCodecState state, UINT8* buf, int bytes) { UINT8* ptr; int framesize; int c, chunks; int l, lines; int i, j, x = 0, y, ymax; /* If not even the chunk size is present, we'd better leave */ if (bytes < 4) return 0; /* We don't decode anything unless ...
251,458,799,984,279,740,000,000,000,000,000,000,000
FliDecode.c
222,240,474,666,437,850,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2016-0775
Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.
https://nvd.nist.gov/vuln/detail/CVE-2016-0775
249,520
Pillow
893a40850c2d5da41537958e40569c029a6e127b
https://github.com/python-pillow/Pillow
https://github.com/python-pillow/Pillow/commit/893a40850c2d5da41537958e40569c029a6e127b
FLI overflow error fix and testcase CVE-2016-0775
0
ImagingFliDecode(Imaging im, ImagingCodecState state, UINT8* buf, int bytes) { UINT8* ptr; int framesize; int c, chunks; int l, lines; int i, j, x = 0, y, ymax; /* If not even the chunk size is present, we'd better leave */ if (bytes < 4) return 0; /* We don't decode anything unless ...
292,954,145,023,856,770,000,000,000,000,000,000,000
FliDecode.c
302,782,447,341,432,100,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2016-0775
Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.
https://nvd.nist.gov/vuln/detail/CVE-2016-0775
196,995
tensorflow
c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9
Fix the CHECK failure in tf.raw_ops.QuantizeAndDequantizeV2. PiperOrigin-RevId: 371361603 Change-Id: Ia70e34d41adaadddf928e95e5e5c5c97d5bc60d0
1
void Compute(OpKernelContext* ctx) override { const Tensor& input = ctx->input(0); OP_REQUIRES( ctx, (axis_ == -1 || axis_ < input.shape().dims()), errors::InvalidArgument("Shape must be at least rank ", axis_ + 1, " but is rank ", input.shape().dims())); co...
73,797,812,585,588,640,000,000,000,000,000,000,000
quantize_and_dequantize_op.cc
111,820,661,822,757,210,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-29610
TensorFlow is an end-to-end open source platform for machine learning. The validation in `tf.raw_ops.QuantizeAndDequantizeV2` allows invalid values for `axis` argument:. The validation(https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/quantize_and_dequantize_...
https://nvd.nist.gov/vuln/detail/CVE-2021-29610
249,521
tensorflow
c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/c5b0d5f8ac19888e46ca14b0e27562e7fbbee9a9
Fix the CHECK failure in tf.raw_ops.QuantizeAndDequantizeV2. PiperOrigin-RevId: 371361603 Change-Id: Ia70e34d41adaadddf928e95e5e5c5c97d5bc60d0
0
void Compute(OpKernelContext* ctx) override { const Tensor& input = ctx->input(0); OP_REQUIRES( ctx, axis_ >= -1, errors::InvalidArgument("Axis must be at least -1. Found ", axis_)); OP_REQUIRES( ctx, (axis_ == -1 || axis_ < input.shape().dims()), errors::InvalidArgument("S...
254,060,771,784,812,060,000,000,000,000,000,000,000
quantize_and_dequantize_op.cc
149,077,864,405,379,840,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-29610
TensorFlow is an end-to-end open source platform for machine learning. The validation in `tf.raw_ops.QuantizeAndDequantizeV2` allows invalid values for `axis` argument:. The validation(https://github.com/tensorflow/tensorflow/blob/eccb7ec454e6617738554a255d77f08e60ee0808/tensorflow/core/kernels/quantize_and_dequantize_...
https://nvd.nist.gov/vuln/detail/CVE-2021-29610
196,996
tensorflow
290bb05c80c327ed74fae1d089f1001b1e2a4ef7
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/290bb05c80c327ed74fae1d089f1001b1e2a4ef7
Fix tf.raw_ops.TensorSummaryV2 vulnerability with invalid serialized_summary_metadata. Check that input is actually a scalar before treating it as such. PiperOrigin-RevId: 445197183
1
void Compute(OpKernelContext* c) override { const Tensor& tag = c->input(0); OP_REQUIRES(c, TensorShapeUtils::IsScalar(tag.shape()), errors::InvalidArgument("tag must be scalar")); const Tensor& tensor = c->input(1); const Tensor& serialized_summary_metadata_tensor = c->input(2); ...
84,074,343,442,696,900,000,000,000,000,000,000,000
summary_tensor_op.cc
110,658,907,251,646,350,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-29193
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.TensorSummaryV2` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, ...
https://nvd.nist.gov/vuln/detail/CVE-2022-29193
249,526
tensorflow
290bb05c80c327ed74fae1d089f1001b1e2a4ef7
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/290bb05c80c327ed74fae1d089f1001b1e2a4ef7
Fix tf.raw_ops.TensorSummaryV2 vulnerability with invalid serialized_summary_metadata. Check that input is actually a scalar before treating it as such. PiperOrigin-RevId: 445197183
0
void Compute(OpKernelContext* c) override { const Tensor& tag = c->input(0); OP_REQUIRES(c, TensorShapeUtils::IsScalar(tag.shape()), errors::InvalidArgument("tag must be scalar")); const Tensor& tensor = c->input(1); const Tensor& serialized_summary_metadata_tensor = c->input(2); O...
220,120,881,288,790,100,000,000,000,000,000,000,000
summary_tensor_op.cc
126,987,776,080,380,960,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-29193
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.TensorSummaryV2` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, ...
https://nvd.nist.gov/vuln/detail/CVE-2022-29193
196,999
LibRaw
f1394822a0152ceed77815eafa5cac4e8baab10a
https://github.com/LibRaw/LibRaw
https://github.com/LibRaw/LibRaw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a
SECUNIA advisory 76000 #1 (wrong fuji width set via tiff tag
1
void CLASS panasonic_load_raw() { int row, col, i, j, sh = 0, pred[2], nonz[2]; pana_bits(0); for (row = 0; row < height; row++) { #ifdef LIBRAW_LIBRARY_BUILD checkCancel(); #endif for (col = 0; col < raw_width; col++) { if ((i = col % 14) == 0) pred[0] = pred[1] = nonz[0] = nonz[1] =...
321,977,543,448,925,350,000,000,000,000,000,000,000
dcraw.c
328,099,487,843,809,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-16909
An error related to the "LibRaw::panasonic_load_raw()" function (dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash via a specially crafted TIFF image.
https://nvd.nist.gov/vuln/detail/CVE-2017-16909
249,565
LibRaw
f1394822a0152ceed77815eafa5cac4e8baab10a
https://github.com/LibRaw/LibRaw
https://github.com/LibRaw/LibRaw/commit/f1394822a0152ceed77815eafa5cac4e8baab10a
SECUNIA advisory 76000 #1 (wrong fuji width set via tiff tag
0
void CLASS panasonic_load_raw() { int row, col, i, j, sh = 0, pred[2], nonz[2]; pana_bits(0); for (row = 0; row < raw_height; row++) { #ifdef LIBRAW_LIBRARY_BUILD checkCancel(); #endif for (col = 0; col < raw_width; col++) { if ((i = col % 14) == 0) pred[0] = pred[1] = nonz[0] = nonz[...
28,757,662,744,153,570,000,000,000,000,000,000,000
dcraw.c
244,721,317,821,702,520,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-16909
An error related to the "LibRaw::panasonic_load_raw()" function (dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash via a specially crafted TIFF image.
https://nvd.nist.gov/vuln/detail/CVE-2017-16909
197,000
csync2
416f1de878ef97e27e27508914f7ba8599a0be22
https://github.com/LINBIT/csync2
https://github.com/LINBIT/csync2/commit/416f1de878ef97e27e27508914f7ba8599a0be22
fail HELLO command when SSL is required
1
void csync_daemon_session() { static char line[4 * 4096]; struct stat sb; address_t peername = { .sa.sa_family = AF_UNSPEC, }; socklen_t peerlen = sizeof(peername); char *peer=0, *tag[32]; int i; if (fstat(0, &sb)) csync_fatal("Can't run fstat on fd 0: %s", strerror(errno)); switch (sb.st_mode & S_IFMT) { ...
131,823,341,139,697,040,000,000,000,000,000,000,000
daemon.c
233,864,296,026,741,300,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2019-15522
An issue was discovered in LINBIT csync2 through 2.0. csync_daemon_session in daemon.c neglects to force a failure of a hello command when the configuration requires use of SSL.
https://nvd.nist.gov/vuln/detail/CVE-2019-15522
249,650
csync2
416f1de878ef97e27e27508914f7ba8599a0be22
https://github.com/LINBIT/csync2
https://github.com/LINBIT/csync2/commit/416f1de878ef97e27e27508914f7ba8599a0be22
fail HELLO command when SSL is required
0
void csync_daemon_session() { static char line[4 * 4096]; struct stat sb; address_t peername = { .sa.sa_family = AF_UNSPEC, }; socklen_t peerlen = sizeof(peername); char *peer=0, *tag[32]; int i; if (fstat(0, &sb)) csync_fatal("Can't run fstat on fd 0: %s", strerror(errno)); switch (sb.st_mode & S_IFMT) { ...
261,261,767,210,913,520,000,000,000,000,000,000,000
daemon.c
94,641,518,426,319,400,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2019-15522
An issue was discovered in LINBIT csync2 through 2.0. csync_daemon_session in daemon.c neglects to force a failure of a hello command when the configuration requires use of SSL.
https://nvd.nist.gov/vuln/detail/CVE-2019-15522
197,009
qemu
ebf101955ce8f8d72fba103b5151115a4335de2c
https://github.com/bonzini/qemu
https://github.com/qemu/qemu/commit/ebf101955ce8f8d72fba103b5151115a4335de2c
virtiofsd: avoid /proc/self/fd tempdir In order to prevent /proc/self/fd escapes a temporary directory is created where /proc/self/fd is bind-mounted. This doesn't work on read-only file systems. Avoid the temporary directory by bind-mounting /proc/self/fd over /proc. This does not affect other processes since we rem...
1
static void setup_namespaces(struct lo_data *lo, struct fuse_session *se) { pid_t child; char template[] = "virtiofsd-XXXXXX"; char *tmpdir; /* * Create a new pid namespace for *child* processes. We'll have to * fork in order to enter the new pid namespace. A new mount namespace * is a...
178,505,660,106,590,470,000,000,000,000,000,000,000
passthrough_ll.c
230,166,035,770,931,700,000,000,000,000,000,000,000
[ "CWE-269" ]
CVE-2020-35517
A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.
https://nvd.nist.gov/vuln/detail/CVE-2020-35517
249,904
qemu
ebf101955ce8f8d72fba103b5151115a4335de2c
https://github.com/bonzini/qemu
https://github.com/qemu/qemu/commit/ebf101955ce8f8d72fba103b5151115a4335de2c
virtiofsd: avoid /proc/self/fd tempdir In order to prevent /proc/self/fd escapes a temporary directory is created where /proc/self/fd is bind-mounted. This doesn't work on read-only file systems. Avoid the temporary directory by bind-mounting /proc/self/fd over /proc. This does not affect other processes since we rem...
0
static void setup_namespaces(struct lo_data *lo, struct fuse_session *se) { pid_t child; /* * Create a new pid namespace for *child* processes. We'll have to * fork in order to enter the new pid namespace. A new mount namespace * is also needed so that we can remount /proc for the new pid ...
112,273,463,360,716,940,000,000,000,000,000,000,000
passthrough_ll.c
184,303,727,564,008,100,000,000,000,000,000,000,000
[ "CWE-269" ]
CVE-2020-35517
A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.
https://nvd.nist.gov/vuln/detail/CVE-2020-35517
197,011
tensorflow
79865b542f9ffdc9caeb255631f7c56f1d4b6517
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517
Fix memory corruption issue with `tf.raw_ops.DrawBoundingBoxesV2`. PiperOrigin-RevId: 372033910 Change-Id: I8a9f4efc1c8ddaacbc26ec1fbe4bfdd6791c226d
1
void Compute(OpKernelContext* context) override { const Tensor& images = context->input(0); const Tensor& boxes = context->input(1); const int64 depth = images.dim_size(3); OP_REQUIRES(context, images.dims() == 4, errors::InvalidArgument("The rank of the images should be 4")); OP_...
118,761,552,607,594,430,000,000,000,000,000,000,000
draw_bounding_box_op.cc
271,052,095,263,737,130,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-29571
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs. The implementation(https://github.com/tensorflow/tensorflow/blob/31bd5026304677faa8a0b77...
https://nvd.nist.gov/vuln/detail/CVE-2021-29571
249,961
tensorflow
79865b542f9ffdc9caeb255631f7c56f1d4b6517
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517
Fix memory corruption issue with `tf.raw_ops.DrawBoundingBoxesV2`. PiperOrigin-RevId: 372033910 Change-Id: I8a9f4efc1c8ddaacbc26ec1fbe4bfdd6791c226d
0
void Compute(OpKernelContext* context) override { const Tensor& images = context->input(0); const Tensor& boxes = context->input(1); const int64 depth = images.dim_size(3); OP_REQUIRES(context, images.dims() == 4, errors::InvalidArgument("The rank of the images should be 4")); OP_...
189,275,285,499,168,400,000,000,000,000,000,000,000
draw_bounding_box_op.cc
89,877,513,169,299,290,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-29571
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs. The implementation(https://github.com/tensorflow/tensorflow/blob/31bd5026304677faa8a0b77...
https://nvd.nist.gov/vuln/detail/CVE-2021-29571
197,017
ImageMagick
e45e48b881038487d0bc94d92a16c1537616cc0a
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e45e48b881038487d0bc94d92a16c1537616cc0a
Suspend exception processing if too many exceptions
1
static Image *ReadVIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define VFF_CM_genericRGB 15 #define VFF_CM_ntscRGB 1 #define VFF_CM_NONE 0 #define VFF_DEP_DECORDER 0x4 #define VFF_DEP_NSORDER 0x8 #define VFF_DES_RAW 0 #define VFF_LOC_IMPLICIT 1 #define VFF_MAPTYP_NONE 0 #define VFF_MAPTY...
210,602,903,201,979,360,000,000,000,000,000,000,000
viff.c
14,051,023,595,321,186,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2016-10066
Buffer overflow in the ReadVIFFImage function in coders/viff.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10066
250,034
ImageMagick
e45e48b881038487d0bc94d92a16c1537616cc0a
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e45e48b881038487d0bc94d92a16c1537616cc0a
Suspend exception processing if too many exceptions
0
static Image *ReadVIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define VFF_CM_genericRGB 15 #define VFF_CM_ntscRGB 1 #define VFF_CM_NONE 0 #define VFF_DEP_DECORDER 0x4 #define VFF_DEP_NSORDER 0x8 #define VFF_DES_RAW 0 #define VFF_LOC_IMPLICIT 1 #define VFF_MAPTYP_NONE 0 #define VFF_MAPTY...
247,878,191,581,406,800,000,000,000,000,000,000,000
viff.c
200,527,251,491,055,150,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2016-10066
Buffer overflow in the ReadVIFFImage function in coders/viff.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10066
197,027
ImageMagick
bdbbb13f1fe9b7e2465502c500561720f7456aac
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/bdbbb13f1fe9b7e2465502c500561720f7456aac
https://github.com/ImageMagick/ImageMagick/issues/715
1
static Image *ReadPSImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define BoundingBox "BoundingBox:" #define BeginDocument "BeginDocument:" #define BeginXMPPacket "<?xpacket begin=" #define EndXMPPacket "<?xpacket end=" #define ICCProfile "BeginICCProfile:" #define CMYKCustomColor "CMYKCustomColor:...
113,324,474,149,406,740,000,000,000,000,000,000,000
ps.c
12,038,977,322,774,740,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-14172
In coders/ps.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "extent" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CP...
https://nvd.nist.gov/vuln/detail/CVE-2017-14172
250,052
ImageMagick
bdbbb13f1fe9b7e2465502c500561720f7456aac
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/bdbbb13f1fe9b7e2465502c500561720f7456aac
https://github.com/ImageMagick/ImageMagick/issues/715
0
static Image *ReadPSImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define BoundingBox "BoundingBox:" #define BeginDocument "BeginDocument:" #define BeginXMPPacket "<?xpacket begin=" #define EndXMPPacket "<?xpacket end=" #define ICCProfile "BeginICCProfile:" #define CMYKCustomColor "CMYKCustomColor:...
193,985,269,216,754,120,000,000,000,000,000,000,000
ps.c
147,883,543,833,169,960,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-14172
In coders/ps.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "extent" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CP...
https://nvd.nist.gov/vuln/detail/CVE-2017-14172
197,038
wolfssl
fb2288c46dd4c864b78f00a47a364b96a09a5c0f
https://github.com/wolfSSL/wolfssl
https://github.com/wolfSSL/wolfssl/commit/fb2288c46dd4c864b78f00a47a364b96a09a5c0f
RSA-PSS: Handle edge case with encoding message to hash When the key is small relative to the digest (1024-bit key, 64-byte hash, 61-byte salt length), the internal message to hash is larger than the output size. Allocate a buffer for the message when this happens.
1
static int RsaPad_PSS(const byte* input, word32 inputLen, byte* pkcsBlock, word32 pkcsBlockLen, WC_RNG* rng, enum wc_HashType hType, int mgf, int saltLen, int bits, void* heap) { int ret = 0; int hLen, i, o, maskLen, hiBits; byte* m; byte* s; #if defined(WOLFSSL_PSS_LONG_SALT) || def...
135,482,897,559,676,240,000,000,000,000,000,000,000
rsa.c
97,367,046,628,886,640,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2020-36177
RsaPad_PSS in wolfcrypt/src/rsa.c in wolfSSL before 4.6.0 has an out-of-bounds write for certain relationships between key size and digest size.
https://nvd.nist.gov/vuln/detail/CVE-2020-36177
250,254
wolfssl
fb2288c46dd4c864b78f00a47a364b96a09a5c0f
https://github.com/wolfSSL/wolfssl
https://github.com/wolfSSL/wolfssl/commit/fb2288c46dd4c864b78f00a47a364b96a09a5c0f
RSA-PSS: Handle edge case with encoding message to hash When the key is small relative to the digest (1024-bit key, 64-byte hash, 61-byte salt length), the internal message to hash is larger than the output size. Allocate a buffer for the message when this happens.
0
static int RsaPad_PSS(const byte* input, word32 inputLen, byte* pkcsBlock, word32 pkcsBlockLen, WC_RNG* rng, enum wc_HashType hType, int mgf, int saltLen, int bits, void* heap) { int ret = 0; int hLen, i, o, maskLen, hiBits; byte* m; byte* s; #if defined(WOLFSSL_NO_MALLOC) && !define...
182,933,276,051,351,070,000,000,000,000,000,000,000
rsa.c
134,635,770,565,341,240,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2020-36177
RsaPad_PSS in wolfcrypt/src/rsa.c in wolfSSL before 4.6.0 has an out-of-bounds write for certain relationships between key size and digest size.
https://nvd.nist.gov/vuln/detail/CVE-2020-36177
197,040
ImageMagick
0c5b1e430a83ef793a7334bbbee408cf3c628699
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/0c5b1e430a83ef793a7334bbbee408cf3c628699
Added check to prevent image being 0x0 (reported in #489).
1
static Image *ReadDDSImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image; MagickBooleanType status, cubemap = MagickFalse, volume = MagickFalse; CompressionType compression; DDSInfo dds_info; DDSDecoder *decoder; PixelTrait alpha_trait; si...
20,161,642,212,172,122,000,000,000,000,000,000,000
dds.c
122,425,543,694,324,260,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-9141
In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the ResetImageProfileIterator function in MagickCore/profile.c because of missing checks in the ReadDDSImage function in coders/dds.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-9141
250,333
ImageMagick
0c5b1e430a83ef793a7334bbbee408cf3c628699
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/0c5b1e430a83ef793a7334bbbee408cf3c628699
Added check to prevent image being 0x0 (reported in #489).
0
static Image *ReadDDSImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image; MagickBooleanType status, cubemap = MagickFalse, volume = MagickFalse; CompressionType compression; DDSInfo dds_info; DDSDecoder *decoder; PixelTrait alpha_trait; si...
151,097,602,899,905,110,000,000,000,000,000,000,000
dds.c
283,400,092,306,245,360,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-9141
In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the ResetImageProfileIterator function in MagickCore/profile.c because of missing checks in the ReadDDSImage function in coders/dds.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-9141
197,041
rtl_433
2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8
https://github.com/merbanan/rtl_433
https://github.com/merbanan/rtl_433/commit/2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8
minor: Fix overflow in Clipsal-CMR113 and Somfy-IOHC reported by aug5t7
1
static int somfy_iohc_decode(r_device *decoder, bitbuffer_t *bitbuffer) { uint8_t const preamble_pattern[] = {0x57, 0xfd, 0x99}; uint8_t b[19 + 15]; // 19 byte + up 15 byte payload if (bitbuffer->num_rows != 1) return DECODE_ABORT_EARLY; int offset = bitbuffer_search(bitbuffer, 0, 0, preamble...
176,992,000,380,313,960,000,000,000,000,000,000,000
somfy_iohc.c
182,831,205,715,539,200,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-25051
An Off-by-one Error occurs in cmr113_decode of rtl_433 21.12 when decoding a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2022-25051
250,338
rtl_433
2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8
https://github.com/merbanan/rtl_433
https://github.com/merbanan/rtl_433/commit/2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8
minor: Fix overflow in Clipsal-CMR113 and Somfy-IOHC reported by aug5t7
0
static int somfy_iohc_decode(r_device *decoder, bitbuffer_t *bitbuffer) { uint8_t const preamble_pattern[] = {0x57, 0xfd, 0x99}; uint8_t b[19 + 15]; // 19 byte + up 15 byte payload if (bitbuffer->num_rows != 1) return DECODE_ABORT_EARLY; unsigned offset = bitbuffer_search(bitbuffer, 0, 0, pre...
311,193,236,447,656,130,000,000,000,000,000,000,000
somfy_iohc.c
296,710,748,318,366,350,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-25051
An Off-by-one Error occurs in cmr113_decode of rtl_433 21.12 when decoding a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2022-25051
197,058
tensorflow
49f73c55d56edffebde4bca4a407ad69c1cae433
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/49f73c55d56edffebde4bca4a407ad69c1cae433
Fix integer overflow in BMP decoder by making the checks in DecodeBmp more stringent. Add fuzzer to improve the robustness of the decoder in the future. PiperOrigin-RevId: 185780111
1
void Compute(OpKernelContext* context) override { const Tensor& contents = context->input(0); OP_REQUIRES(context, TensorShapeUtils::IsScalar(contents.shape()), errors::InvalidArgument("contents must be scalar, got shape ", contents.shape().DebugString()...
231,101,469,914,053,130,000,000,000,000,000,000,000
decode_bmp_op.cc
45,204,728,794,421,120,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-21233
TensorFlow before 1.7.0 has an integer overflow that causes an out-of-bounds read, possibly causing disclosure of the contents of process memory. This occurs in the DecodeBmp feature of the BMP decoder in core/kernels/decode_bmp_op.cc.
https://nvd.nist.gov/vuln/detail/CVE-2018-21233
250,699
tensorflow
49f73c55d56edffebde4bca4a407ad69c1cae433
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/49f73c55d56edffebde4bca4a407ad69c1cae433
Fix integer overflow in BMP decoder by making the checks in DecodeBmp more stringent. Add fuzzer to improve the robustness of the decoder in the future. PiperOrigin-RevId: 185780111
0
void Compute(OpKernelContext* context) override { const Tensor& contents = context->input(0); OP_REQUIRES(context, TensorShapeUtils::IsScalar(contents.shape()), errors::InvalidArgument("contents must be scalar, got shape ", contents.shape().DebugString()...
207,877,365,365,707,880,000,000,000,000,000,000,000
decode_bmp_op.cc
190,361,373,359,406,230,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-21233
TensorFlow before 1.7.0 has an integer overflow that causes an out-of-bounds read, possibly causing disclosure of the contents of process memory. This occurs in the DecodeBmp feature of the BMP decoder in core/kernels/decode_bmp_op.cc.
https://nvd.nist.gov/vuln/detail/CVE-2018-21233
197,061
vlc
fbe2837bc80f155c001781041a54c58b5524fc14
https://github.com/videolan/vlc
https://github.com/videolan/vlc/commit/fbe2837bc80f155c001781041a54c58b5524fc14
misc: update: fix buffer overflow in updater On 32 bit builds, parsing of update status files with a size of 4294967295 or more lead to an integer truncation in a call to malloc and a subsequent buffer overflow. This happened prior to checking the files' signature. The commit fixes this by disallowing overly large sta...
1
static bool GetUpdateFile( update_t *p_update ) { stream_t *p_stream = NULL; char *psz_version_line = NULL; char *psz_update_data = NULL; p_stream = stream_UrlNew( p_update->p_libvlc, UPDATE_VLC_STATUS_URL ); if( !p_stream ) { msg_Err( p_update->p_libvlc, "Failed to open %s for reading"...
254,754,156,406,505,640,000,000,000,000,000,000,000
update.c
57,330,620,271,314,480,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2014-9625
The GetUpdateFile function in misc/update.c in the Updater in VideoLAN VLC media player before 2.1.6 performs an incorrect cast operation from a 64-bit integer to a 32-bit integer, which allows remote attackers to conduct buffer overflow attacks and execute arbitrary code via a crafted update status file, aka an "integ...
https://nvd.nist.gov/vuln/detail/CVE-2014-9625
250,725
vlc
fbe2837bc80f155c001781041a54c58b5524fc14
https://github.com/videolan/vlc
https://github.com/videolan/vlc/commit/fbe2837bc80f155c001781041a54c58b5524fc14
misc: update: fix buffer overflow in updater On 32 bit builds, parsing of update status files with a size of 4294967295 or more lead to an integer truncation in a call to malloc and a subsequent buffer overflow. This happened prior to checking the files' signature. The commit fixes this by disallowing overly large sta...
0
static bool GetUpdateFile( update_t *p_update ) { stream_t *p_stream = NULL; char *psz_version_line = NULL; char *psz_update_data = NULL; p_stream = stream_UrlNew( p_update->p_libvlc, UPDATE_VLC_STATUS_URL ); if( !p_stream ) { msg_Err( p_update->p_libvlc, "Failed to open %s for reading"...
273,428,775,978,830,700,000,000,000,000,000,000,000
update.c
61,834,672,601,971,160,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2014-9625
The GetUpdateFile function in misc/update.c in the Updater in VideoLAN VLC media player before 2.1.6 performs an incorrect cast operation from a 64-bit integer to a 32-bit integer, which allows remote attackers to conduct buffer overflow attacks and execute arbitrary code via a crafted update status file, aka an "integ...
https://nvd.nist.gov/vuln/detail/CVE-2014-9625
197,062
gpac
6063b1a011c3f80cee25daade18154e15e4c058c
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/6063b1a011c3f80cee25daade18154e15e4c058c
fix UAF in audio_sample_entry_Read (#1440)
1
GF_Err audio_sample_entry_Read(GF_Box *s, GF_BitStream *bs) { GF_MPEGAudioSampleEntryBox *ptr; char *data; u8 a, b, c, d; u32 i, size, v, nb_alnum; GF_Err e; u64 pos, start; ptr = (GF_MPEGAudioSampleEntryBox *)s; start = gf_bs_get_position(bs); gf_bs_seek(bs, start + 8); v = gf_bs_read_u16(bs); if (v) pt...
128,902,054,134,780,080,000,000,000,000,000,000,000
box_code_base.c
85,344,010,475,907,140,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2020-11558
An issue was discovered in libgpac.a in GPAC 0.8.0, as demonstrated by MP4Box. audio_sample_entry_Read in isomedia/box_code_base.c does not properly decide when to make gf_isom_box_del calls. This leads to various use-after-free outcomes involving mdia_Read, gf_isom_delete_movie, and gf_isom_parse_movie_boxes.
https://nvd.nist.gov/vuln/detail/CVE-2020-11558
251,186
gpac
6063b1a011c3f80cee25daade18154e15e4c058c
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/6063b1a011c3f80cee25daade18154e15e4c058c
fix UAF in audio_sample_entry_Read (#1440)
0
GF_Err audio_sample_entry_Read(GF_Box *s, GF_BitStream *bs) { GF_MPEGAudioSampleEntryBox *ptr; char *data; u8 a, b, c, d; u32 i, size, v, nb_alnum; GF_Err e; u64 pos, start; ptr = (GF_MPEGAudioSampleEntryBox *)s; start = gf_bs_get_position(bs); gf_bs_seek(bs, start + 8); v = gf_bs_read_u16(bs); if (v) pt...
163,824,806,262,801,470,000,000,000,000,000,000,000
box_code_base.c
1,071,962,985,600,653,200,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2020-11558
An issue was discovered in libgpac.a in GPAC 0.8.0, as demonstrated by MP4Box. audio_sample_entry_Read in isomedia/box_code_base.c does not properly decide when to make gf_isom_box_del calls. This leads to various use-after-free outcomes involving mdia_Read, gf_isom_delete_movie, and gf_isom_parse_movie_boxes.
https://nvd.nist.gov/vuln/detail/CVE-2020-11558
197,065
uWebSockets
37deefd01f0875e133ea967122e3a5e421b8fcd9
https://github.com/uWebSockets/uWebSockets
https://github.com/uWebSockets/uWebSockets/commit/37deefd01f0875e133ea967122e3a5e421b8fcd9
Don't inflate more than ~16mb, drop connection on inflate error
1
char *Hub::inflate(char *data, size_t &length) { dynamicInflationBuffer.clear(); inflationStream.next_in = (Bytef *) data; inflationStream.avail_in = length; int err; do { inflationStream.next_out = (Bytef *) inflationBuffer; inflationStream.avail_out = LARGE_BUFFER_SIZE; e...
194,760,206,242,953,270,000,000,000,000,000,000,000
Hub.cpp
189,039,026,414,158,500,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-10544
uws is a WebSocket server library. By sending a 256mb websocket message to a uws server instance with permessage-deflate enabled, there is a possibility used compression will shrink said 256mb down to less than 16mb of websocket payload which passes the length check of 16mb payload. This data will then inflate up to 25...
https://nvd.nist.gov/vuln/detail/CVE-2016-10544
251,457
uWebSockets
37deefd01f0875e133ea967122e3a5e421b8fcd9
https://github.com/uWebSockets/uWebSockets
https://github.com/uWebSockets/uWebSockets/commit/37deefd01f0875e133ea967122e3a5e421b8fcd9
Don't inflate more than ~16mb, drop connection on inflate error
0
char *Hub::inflate(char *data, size_t &length) { dynamicInflationBuffer.clear(); inflationStream.next_in = (Bytef *) data; inflationStream.avail_in = length; int err; do { inflationStream.next_out = (Bytef *) inflationBuffer; inflationStream.avail_out = LARGE_BUFFER_SIZE; e...
223,900,553,132,238,860,000,000,000,000,000,000,000
Hub.cpp
285,309,546,383,105,670,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-10544
uws is a WebSocket server library. By sending a 256mb websocket message to a uws server instance with permessage-deflate enabled, there is a possibility used compression will shrink said 256mb down to less than 16mb of websocket payload which passes the length check of 16mb payload. This data will then inflate up to 25...
https://nvd.nist.gov/vuln/detail/CVE-2016-10544
197,067
tensorflow
cfa91be9863a91d5105a3b4941096044ab32036b
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b
Fix one FPE and remove two CHECK-fails. PiperOrigin-RevId: 369349640 Change-Id: I1fedbfc2b5bab635c5cb51f103d7c9176f79831a
1
void operator()(OpKernelContext* context, const T1* input_data, int input_batches, int input_height, int input_width, int input_depth, int input_offset, const T2* filter_data, int filter_height, int filter_width, int filter_count, int filter_offs...
293,798,020,820,581,000,000,000,000,000,000,000,000
quantized_conv_ops.cc
266,677,417,116,469,300,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-29527
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedConv2D`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/00e9a4d67d76703fa1aee33dac582acf317e0e81/tensorflow/core/kernels/quantized_conv_ops.cc#L257-L25...
https://nvd.nist.gov/vuln/detail/CVE-2021-29527
251,509
tensorflow
cfa91be9863a91d5105a3b4941096044ab32036b
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b
Fix one FPE and remove two CHECK-fails. PiperOrigin-RevId: 369349640 Change-Id: I1fedbfc2b5bab635c5cb51f103d7c9176f79831a
0
void operator()(OpKernelContext* context, const T1* input_data, int input_batches, int input_height, int input_width, int input_depth, int input_offset, const T2* filter_data, int filter_height, int filter_width, int filter_count, int filter_offs...
155,751,194,904,022,230,000,000,000,000,000,000,000
quantized_conv_ops.cc
210,743,530,848,738,440,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-29527
TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedConv2D`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/00e9a4d67d76703fa1aee33dac582acf317e0e81/tensorflow/core/kernels/quantized_conv_ops.cc#L257-L25...
https://nvd.nist.gov/vuln/detail/CVE-2021-29527
197,069
engine
c6655a0b620a3e31f085cc906f8073fe81b2fad3
https://github.com/gost-engine/engine
https://github.com/gost-engine/engine/commit/c6655a0b620a3e31f085cc906f8073fe81b2fad3
Fix buffer overrun in creating key transport blob according to RFC 9189, 4.2.4.1 Resolves: CVE-2022-29242
1
static int pkey_gost2018_encrypt(EVP_PKEY_CTX *pctx, unsigned char *out, size_t *out_len, const unsigned char *key, size_t key_len) { PSKeyTransport_gost *pst = NULL; EVP_PKEY *pubk = EVP_PKEY_CTX_get0_pkey(pctx); struct gost_pmeth_data *data = EVP_PKEY_CT...
288,648,459,538,546,000,000,000,000,000,000,000,000
gost_ec_keyx.c
121,222,744,839,431,170,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-29242
GOST engine is a reference implementation of the Russian GOST crypto algorithms for OpenSSL. TLS clients using GOST engine when ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is agreed and the server uses 512 bit GOST secret keys are vulnerable to buffer overflow. GOST engine version 3.0.1 contains a patch ...
https://nvd.nist.gov/vuln/detail/CVE-2022-29242
251,524
engine
c6655a0b620a3e31f085cc906f8073fe81b2fad3
https://github.com/gost-engine/engine
https://github.com/gost-engine/engine/commit/c6655a0b620a3e31f085cc906f8073fe81b2fad3
Fix buffer overrun in creating key transport blob according to RFC 9189, 4.2.4.1 Resolves: CVE-2022-29242
0
static int pkey_gost2018_encrypt(EVP_PKEY_CTX *pctx, unsigned char *out, size_t *out_len, const unsigned char *key, size_t key_len) { PSKeyTransport_gost *pst = NULL; EVP_PKEY *pubk = EVP_PKEY_CTX_get0_pkey(pctx); struct gost_pmeth_data *data = EVP_PKEY_CT...
279,910,447,402,866,250,000,000,000,000,000,000,000
gost_ec_keyx.c
151,021,593,107,318,780,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-29242
GOST engine is a reference implementation of the Russian GOST crypto algorithms for OpenSSL. TLS clients using GOST engine when ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is agreed and the server uses 512 bit GOST secret keys are vulnerable to buffer overflow. GOST engine version 3.0.1 contains a patch ...
https://nvd.nist.gov/vuln/detail/CVE-2022-29242
197,072
libheif
995a4283d8ed2d0d2c1ceb1a577b993df2f0e014
https://github.com/strukturag/libheif
https://github.com/strukturag/libheif/commit/995a4283d8ed2d0d2c1ceb1a577b993df2f0e014
Detect non-existing referenced alpha images (fixes #123)
1
Error HeifContext::interpret_heif_file() { m_all_images.clear(); m_top_level_images.clear(); m_primary_image.reset(); // --- reference all non-hidden images std::vector<heif_item_id> image_IDs = m_heif_file->get_item_IDs(); bool primary_is_grid = false; for (heif_item_id id : image_IDs) { auto inf...
320,001,126,686,539,800,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2019-11471
libheif 1.4.0 has a use-after-free in heif::HeifContext::Image::set_alpha_channel in heif_context.h because heif_context.cc mishandles references to non-existing alpha images.
https://nvd.nist.gov/vuln/detail/CVE-2019-11471
251,585
libheif
995a4283d8ed2d0d2c1ceb1a577b993df2f0e014
https://github.com/strukturag/libheif
https://github.com/strukturag/libheif/commit/995a4283d8ed2d0d2c1ceb1a577b993df2f0e014
Detect non-existing referenced alpha images (fixes #123)
0
Error HeifContext::interpret_heif_file() { m_all_images.clear(); m_top_level_images.clear(); m_primary_image.reset(); // --- reference all non-hidden images std::vector<heif_item_id> image_IDs = m_heif_file->get_item_IDs(); bool primary_is_grid = false; for (heif_item_id id : image_IDs) { auto inf...
236,295,979,486,157,400,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2019-11471
libheif 1.4.0 has a use-after-free in heif::HeifContext::Image::set_alpha_channel in heif_context.h because heif_context.cc mishandles references to non-existing alpha images.
https://nvd.nist.gov/vuln/detail/CVE-2019-11471
197,089
pycrypto
8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4
https://github.com/dlitz/pycrypto
https://github.com/dlitz/pycrypto/commit/8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4
Throw exception when IV is used with ECB or CTR The IV parameter is currently ignored when initializing a cipher in ECB or CTR mode. For CTR mode, it is confusing: it takes some time to see that a different parameter is needed (the counter). For ECB mode, it is outright dangerous. This patch forces an exception to ...
1
ALGnew(PyObject *self, PyObject *args, PyObject *kwdict) { unsigned char *key, *IV; ALGobject * new=NULL; int keylen, IVlen=0, mode=MODE_ECB, segment_size=0; PyObject *counter = NULL; int counter_shortcut = 0; #ifdef PCT_ARC2_MODULE int effective_keylen = 1024; /* this is a weird default, but it's compa...
12,176,247,247,837,405,000,000,000,000,000,000,000
block_template.c
199,374,439,597,906,450,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2013-7459
Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
https://nvd.nist.gov/vuln/detail/CVE-2013-7459
251,916
pycrypto
8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4
https://github.com/dlitz/pycrypto
https://github.com/dlitz/pycrypto/commit/8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4
Throw exception when IV is used with ECB or CTR The IV parameter is currently ignored when initializing a cipher in ECB or CTR mode. For CTR mode, it is confusing: it takes some time to see that a different parameter is needed (the counter). For ECB mode, it is outright dangerous. This patch forces an exception to ...
0
ALGnew(PyObject *self, PyObject *args, PyObject *kwdict) { unsigned char *key, *IV; ALGobject * new=NULL; int keylen, IVlen=0, mode=MODE_ECB, segment_size=0; PyObject *counter = NULL; int counter_shortcut = 0; #ifdef PCT_ARC2_MODULE int effective_keylen = 1024; /* this is a weird default, but it's compa...
41,961,625,412,170,774,000,000,000,000,000,000,000
block_template.c
327,982,943,611,753,100,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2013-7459
Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
https://nvd.nist.gov/vuln/detail/CVE-2013-7459
197,093
tensorflow
1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6
Fix heap-buffer-overflow issue with `tf.raw_ops.SparseReshape`. PiperOrigin-RevId: 371218558 Change-Id: I6a6dc5bf15b50a1d05bdd95e9ba347cb39f40f45
1
void Compute(OpKernelContext* context) override { ReshapeSparseTensor<Device>(context, context->input(0), context->input(1), context->input(2), 0 /* output indices index */, 1 /* output shape index */); }
229,323,863,455,167,630,000,000,000,000,000,000,000
sparse_reshape_op.cc
199,735,406,648,728,300,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-29611
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `SparseReshape` results in a denial of service based on a `CHECK`-failure. The implementation(https://github.com/tensorflow/tensorflow/blob/e87b51ce05c3eb172065a6ea5f48415854223285/tensorflow/core/kernels/sparse_reshape_op.c...
https://nvd.nist.gov/vuln/detail/CVE-2021-29611
251,920
tensorflow
1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6
Fix heap-buffer-overflow issue with `tf.raw_ops.SparseReshape`. PiperOrigin-RevId: 371218558 Change-Id: I6a6dc5bf15b50a1d05bdd95e9ba347cb39f40f45
0
void Compute(OpKernelContext* context) override { const Tensor& input_indices_in = context->input(0); const Tensor& input_shape_in = context->input(1); OP_REQUIRES(context, TensorShapeUtils::IsMatrix(input_indices_in.shape()), errors::InvalidArgument("Input must be a matrix.")); OP_RE...
204,925,988,047,412,100,000,000,000,000,000,000,000
sparse_reshape_op.cc
91,487,249,017,968,100,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-29611
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `SparseReshape` results in a denial of service based on a `CHECK`-failure. The implementation(https://github.com/tensorflow/tensorflow/blob/e87b51ce05c3eb172065a6ea5f48415854223285/tensorflow/core/kernels/sparse_reshape_op.c...
https://nvd.nist.gov/vuln/detail/CVE-2021-29611
197,094
libebml
05beb69ba60acce09f73ed491bb76f332849c3a0
https://github.com/Matroska-Org/libebml
https://github.com/Matroska-Org/libebml/commit/05beb69ba60acce09f73ed491bb76f332849c3a0
Check the max size to read before actually reading The size check waas also missing from the length parsing
1
EbmlElement * EbmlElement::FindNextElement(IOCallback & DataStream, const EbmlSemanticContext & Context, int & UpperLevel, uint64 MaxDataSize, bool AllowDummyElt, unsigned int MaxLowerLevel) { int PossibleID_Length = 0; binary PossibleIdNSize[16]; int PossibleSizeLength;...
42,929,303,275,725,270,000,000,000,000,000,000,000
EbmlElement.cpp
165,580,578,735,876,520,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-13615
libebml before 1.3.6, as used in the MKV module in VideoLAN VLC Media Player binaries before 3.0.3, has a heap-based buffer over-read in EbmlElement::FindNextElement.
https://nvd.nist.gov/vuln/detail/CVE-2019-13615
251,935
libebml
05beb69ba60acce09f73ed491bb76f332849c3a0
https://github.com/Matroska-Org/libebml
https://github.com/Matroska-Org/libebml/commit/05beb69ba60acce09f73ed491bb76f332849c3a0
Check the max size to read before actually reading The size check waas also missing from the length parsing
0
EbmlElement * EbmlElement::FindNextElement(IOCallback & DataStream, const EbmlSemanticContext & Context, int & UpperLevel, uint64 MaxDataSize, bool AllowDummyElt, unsigned int MaxLowerLevel) { int PossibleID_Length = 0; binary PossibleIdNSize[16]; int PossibleSizeLength;...
36,368,746,165,964,220,000,000,000,000,000,000,000
EbmlElement.cpp
336,572,631,394,344,470,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-13615
libebml before 1.3.6, as used in the MKV module in VideoLAN VLC Media Player binaries before 3.0.3, has a heap-based buffer over-read in EbmlElement::FindNextElement.
https://nvd.nist.gov/vuln/detail/CVE-2019-13615
197,112
newsbeuter
c8fea2f60c18ed30bdd1bb6f798e994e51a58260
https://github.com/akrennmair/newsbeuter
https://github.com/akrennmair/newsbeuter/commit/c8fea2f60c18ed30bdd1bb6f798e994e51a58260
Work around shell code in podcast names (#598)
1
std::string queueloader::get_filename(const std::string& str) { std::string fn = ctrl->get_dlpath(); if (fn[fn.length()-1] != NEWSBEUTER_PATH_SEP[0]) fn.append(NEWSBEUTER_PATH_SEP); char buf[1024]; snprintf(buf, sizeof(buf), "%s", str.c_str()); char * base = basename(buf); if (!base || strlen(base) == 0) { c...
327,710,492,846,565,550,000,000,000,000,000,000,000
queueloader.cpp
18,961,785,296,047,963,000,000,000,000,000,000,000
[ "CWE-78" ]
CVE-2017-14500
Improper Neutralization of Special Elements used in an OS Command in the podcast playback function of Podbeuter in Newsbeuter 0.3 through 2.9 allows remote attackers to perform user-assisted code execution by crafting an RSS item with a media enclosure (i.e., a podcast file) that includes shell metacharacters in its fi...
https://nvd.nist.gov/vuln/detail/CVE-2017-14500
252,480
newsbeuter
c8fea2f60c18ed30bdd1bb6f798e994e51a58260
https://github.com/akrennmair/newsbeuter
https://github.com/akrennmair/newsbeuter/commit/c8fea2f60c18ed30bdd1bb6f798e994e51a58260
Work around shell code in podcast names (#598)
0
std::string queueloader::get_filename(const std::string& str) { std::string fn = ctrl->get_dlpath(); if (fn[fn.length()-1] != NEWSBEUTER_PATH_SEP[0]) fn.append(NEWSBEUTER_PATH_SEP); char buf[1024]; snprintf(buf, sizeof(buf), "%s", str.c_str()); char * base = basename(buf); if (!base || strlen(base) == 0) { c...
89,118,840,514,354,980,000,000,000,000,000,000,000
queueloader.cpp
327,720,674,629,306,680,000,000,000,000,000,000,000
[ "CWE-78" ]
CVE-2017-14500
Improper Neutralization of Special Elements used in an OS Command in the podcast playback function of Podbeuter in Newsbeuter 0.3 through 2.9 allows remote attackers to perform user-assisted code execution by crafting an RSS item with a media enclosure (i.e., a podcast file) that includes shell metacharacters in its fi...
https://nvd.nist.gov/vuln/detail/CVE-2017-14500
197,113
newsbeuter
c8fea2f60c18ed30bdd1bb6f798e994e51a58260
https://github.com/akrennmair/newsbeuter
https://github.com/akrennmair/newsbeuter/commit/c8fea2f60c18ed30bdd1bb6f798e994e51a58260
Work around shell code in podcast names (#598)
1
void pb_controller::play_file(const std::string& file) { std::string cmdline; std::string player = cfg->get_configvalue("player"); if (player == "") return; cmdline.append(player); cmdline.append(" \""); cmdline.append(utils::replace_all(file,"\"", "\\\"")); cmdline.append("\""); stfl::reset(); utils::run_in...
84,609,939,629,712,730,000,000,000,000,000,000,000
pb_controller.cpp
15,582,670,243,304,637,000,000,000,000,000,000,000
[ "CWE-78" ]
CVE-2017-14500
Improper Neutralization of Special Elements used in an OS Command in the podcast playback function of Podbeuter in Newsbeuter 0.3 through 2.9 allows remote attackers to perform user-assisted code execution by crafting an RSS item with a media enclosure (i.e., a podcast file) that includes shell metacharacters in its fi...
https://nvd.nist.gov/vuln/detail/CVE-2017-14500
252,483
newsbeuter
c8fea2f60c18ed30bdd1bb6f798e994e51a58260
https://github.com/akrennmair/newsbeuter
https://github.com/akrennmair/newsbeuter/commit/c8fea2f60c18ed30bdd1bb6f798e994e51a58260
Work around shell code in podcast names (#598)
0
void pb_controller::play_file(const std::string& file) { std::string cmdline; std::string player = cfg->get_configvalue("player"); if (player == "") return; cmdline.append(player); cmdline.append(" '"); cmdline.append(utils::replace_all(file,"'", "%27")); cmdline.append("'"); stfl::reset(); utils::run_intera...
84,460,356,672,037,510,000,000,000,000,000,000,000
pb_controller.cpp
111,251,563,636,752,360,000,000,000,000,000,000,000
[ "CWE-78" ]
CVE-2017-14500
Improper Neutralization of Special Elements used in an OS Command in the podcast playback function of Podbeuter in Newsbeuter 0.3 through 2.9 allows remote attackers to perform user-assisted code execution by crafting an RSS item with a media enclosure (i.e., a podcast file) that includes shell metacharacters in its fi...
https://nvd.nist.gov/vuln/detail/CVE-2017-14500
197,115
xterm-snapshots
82ba55b8f994ab30ff561a347b82ea340ba7075c
https://github.com/ThomasDickey/xterm-snapshots
https://github.com/ThomasDickey/xterm-snapshots/commit/82ba55b8f994ab30ff561a347b82ea340ba7075c
snapshot of project "xterm", label xterm-365d
1
SaltTextAway(XtermWidget xw, int which, CELL *cellc, CELL *cell) { TScreen *screen = TScreenOf(xw); SelectedCells *scp; int i; int eol; int need = 0; Char *line; Char *lp; CELL first = *cellc; CELL last = *cell; if (which < 0 || which >= MAX_SELECTIONS) { TRAC...
243,303,151,288,747,050,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2021-27135
xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence.
https://nvd.nist.gov/vuln/detail/CVE-2021-27135
252,536
xterm-snapshots
82ba55b8f994ab30ff561a347b82ea340ba7075c
https://github.com/ThomasDickey/xterm-snapshots
https://github.com/ThomasDickey/xterm-snapshots/commit/82ba55b8f994ab30ff561a347b82ea340ba7075c
snapshot of project "xterm", label xterm-365d
0
SaltTextAway(XtermWidget xw, int which, CELL *cellc, CELL *cell) { TScreen *screen = TScreenOf(xw); SelectedCells *scp; int i; int eol; int need = 0; size_t have = 0; Char *line; Char *lp; CELL first = *cellc; CELL last = *cell; if (which < 0 || which >= MA...
146,211,283,221,991,060,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2021-27135
xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence.
https://nvd.nist.gov/vuln/detail/CVE-2021-27135
197,119
nDPI
7ce478a58b4dd29a8d1e6f4e9df2f778613d9202
https://github.com/ntop/nDPI
https://github.com/ntop/nDPI/commit/7ce478a58b4dd29a8d1e6f4e9df2f778613d9202
ssh: fixing unsigned overflow leading to heap overflow cf GHSL-2020-051
1
static u_int16_t concat_hash_string(struct ndpi_packet_struct *packet, char *buf, u_int8_t client_hash) { u_int16_t offset = 22, buf_out_len = 0; if(offset+sizeof(u_int32_t) >= packet->payload_packet_len) goto invalid_payload; u_int32_t len = ntohl(*(u_int32_t*)&packet->payload[offset]); offset += 4;...
59,102,964,538,939,570,000,000,000,000,000,000,000
ssh.c
229,612,633,139,261,070,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-11939
In nDPI through 3.2 Stable, the SSH protocol dissector has multiple KEXINIT integer overflows that result in a controlled remote heap overflow in concat_hash_string in ssh.c. Due to the granular nature of the overflow primitive and the ability to control both the contents and layout of the nDPI library's heap memory th...
https://nvd.nist.gov/vuln/detail/CVE-2020-11939