idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
252,971 | nDPI | 7ce478a58b4dd29a8d1e6f4e9df2f778613d9202 | https://github.com/ntop/nDPI | https://github.com/ntop/nDPI/commit/7ce478a58b4dd29a8d1e6f4e9df2f778613d9202 | ssh: fixing unsigned overflow leading to heap overflow
cf GHSL-2020-051 | 0 | static u_int16_t concat_hash_string(struct ndpi_packet_struct *packet,
char *buf, u_int8_t client_hash) {
u_int32_t offset = 22, buf_out_len = 0;
if(offset+sizeof(u_int32_t) >= packet->payload_packet_len)
goto invalid_payload;
u_int32_t len = ntohl(*(u_int32_t*)&packet->payload[offset]);
offset += 4;... | 305,118,570,856,768,630,000,000,000,000,000,000,000 | ssh.c | 116,649,129,995,467,670,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-11939 | In nDPI through 3.2 Stable, the SSH protocol dissector has multiple KEXINIT integer overflows that result in a controlled remote heap overflow in concat_hash_string in ssh.c. Due to the granular nature of the overflow primitive and the ability to control both the contents and layout of the nDPI library's heap memory th... | https://nvd.nist.gov/vuln/detail/CVE-2020-11939 |
197,126 | gpac | 87afe070cd6866df7fe80f11b26ef75161de85e0 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/87afe070cd6866df7fe80f11b26ef75161de85e0 | fixed #1734 | 1 | GF_Err HintFile(GF_ISOFile *file, u32 MTUSize, u32 max_ptime, u32 rtp_rate, u32 base_flags, Bool copy_data, Bool interleave, Bool regular_iod, Bool single_group, Bool hint_no_offset)
{
GF_ESD *esd;
GF_InitialObjectDescriptor *iod;
u32 i, val, res, streamType;
u32 sl_mode, prev_ocr, single_ocr, nb_done, tot_bw, bw, ... | 204,950,326,892,951,700,000,000,000,000,000,000,000 | main.c | 146,764,505,750,340,260,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-31257 | The HintFile function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | https://nvd.nist.gov/vuln/detail/CVE-2021-31257 |
253,418 | gpac | 87afe070cd6866df7fe80f11b26ef75161de85e0 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/87afe070cd6866df7fe80f11b26ef75161de85e0 | fixed #1734 | 0 | GF_Err HintFile(GF_ISOFile *file, u32 MTUSize, u32 max_ptime, u32 rtp_rate, u32 base_flags, Bool copy_data, Bool interleave, Bool regular_iod, Bool single_group, Bool hint_no_offset)
{
GF_ESD *esd;
GF_InitialObjectDescriptor *iod;
u32 i, val, res, streamType;
u32 sl_mode, prev_ocr, single_ocr, nb_done, tot_bw, bw, ... | 188,740,914,255,405,500,000,000,000,000,000,000,000 | main.c | 298,967,071,785,704,200,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-31257 | The HintFile function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | https://nvd.nist.gov/vuln/detail/CVE-2021-31257 |
197,127 | lepton | 6a5ceefac1162783fffd9506a3de39c85c725761 | https://github.com/dropbox/lepton | https://github.com/dropbox/lepton/commit/6a5ceefac1162783fffd9506a3de39c85c725761 | fix #111 | 1 | bool read_ujpg( void )
{
using namespace IOUtil;
using namespace Sirikata;
// colldata.start_decoder_worker_thread(std::bind(&simple_decoder, &colldata, str_in));
unsigned char ujpg_mrk[ 64 ];
// this is where we will enable seccomp, before reading user data
write_byte_bill(Billing::HEADER, true,... | 23,962,241,303,848,227,000,000,000,000,000,000,000 | jpgcoder.cc | 317,206,061,460,321,170,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2018-20820 | read_ujpg in jpgcoder.cc in Dropbox Lepton 1.2.1 allows attackers to cause a denial-of-service (application runtime crash because of an integer overflow) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2018-20820 |
253,474 | lepton | 6a5ceefac1162783fffd9506a3de39c85c725761 | https://github.com/dropbox/lepton | https://github.com/dropbox/lepton/commit/6a5ceefac1162783fffd9506a3de39c85c725761 | fix #111 | 0 | bool read_ujpg( void )
{
using namespace IOUtil;
using namespace Sirikata;
// colldata.start_decoder_worker_thread(std::bind(&simple_decoder, &colldata, str_in));
unsigned char ujpg_mrk[ 64 ];
// this is where we will enable seccomp, before reading user data
write_byte_bill(Billing::HEADER, true,... | 295,970,260,975,063,250,000,000,000,000,000,000,000 | jpgcoder.cc | 313,953,252,136,084,800,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2018-20820 | read_ujpg in jpgcoder.cc in Dropbox Lepton 1.2.1 allows attackers to cause a denial-of-service (application runtime crash because of an integer overflow) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2018-20820 |
197,134 | LibRaw | e47384546b43d0fd536e933249047bc397a4d88b | https://github.com/LibRaw/LibRaw | https://github.com/LibRaw/LibRaw/commit/e47384546b43d0fd536e933249047bc397a4d88b | Secunia Advisory SA83050: possible infinite loop in parse_minolta() | 1 | void CLASS parse_minolta(int base)
{
int save, tag, len, offset, high = 0, wide = 0, i, c;
short sorder = order;
fseek(ifp, base, SEEK_SET);
if (fgetc(ifp) || fgetc(ifp) - 'M' || fgetc(ifp) - 'R')
return;
order = fgetc(ifp) * 0x101;
offset = base + get4() + 8;
while ((save = ftell(ifp)) < offset)
{... | 291,626,000,582,475,400,000,000,000,000,000,000,000 | dcraw.c | 14,327,791,662,469,230,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2018-5813 | An error within the "parse_minolta()" function (dcraw/dcraw.c) in LibRaw versions prior to 0.18.11 can be exploited to trigger an infinite loop via a specially crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2018-5813 |
253,663 | LibRaw | e47384546b43d0fd536e933249047bc397a4d88b | https://github.com/LibRaw/LibRaw | https://github.com/LibRaw/LibRaw/commit/e47384546b43d0fd536e933249047bc397a4d88b | Secunia Advisory SA83050: possible infinite loop in parse_minolta() | 0 | void CLASS parse_minolta(int base)
{
int save, tag, len, offset, high = 0, wide = 0, i, c;
short sorder = order;
fseek(ifp, base, SEEK_SET);
if (fgetc(ifp) || fgetc(ifp) - 'M' || fgetc(ifp) - 'R')
return;
order = fgetc(ifp) * 0x101;
offset = base + get4() + 8;
#ifdef LIBRAW_LIBRARY_BUILD
if(offset>if... | 244,392,798,637,168,530,000,000,000,000,000,000,000 | dcraw.c | 192,267,252,051,739,200,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2018-5813 | An error within the "parse_minolta()" function (dcraw/dcraw.c) in LibRaw versions prior to 0.18.11 can be exploited to trigger an infinite loop via a specially crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2018-5813 |
197,137 | fbthrift | c5d6e07588cd03061bc54d451a7fa6e84883d62b | https://github.com/facebook/fbthrift | https://github.com/facebook/fbthrift/commit/c5d6e07588cd03061bc54d451a7fa6e84883d62b | Throw on bad types during skipping data
Summary:
The current code silently returns on bad types. In case when we have an invalid data, we may get a container of a large size with a bad type, this would lead to us running long loop doing nothing (though we already can say that the data is invalid).
The new code would ... | 1 | void skip(Protocol_& prot, TType arg_type) {
switch (arg_type) {
case TType::T_BOOL: {
bool boolv;
prot.readBool(boolv);
return;
}
case TType::T_BYTE: {
int8_t bytev;
prot.readByte(bytev);
return;
}
case TType::T_I16: {
int16_t i16;
prot.readI16(i16)... | 20,884,842,580,766,967,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2019-3558 | Python Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.02.... | https://nvd.nist.gov/vuln/detail/CVE-2019-3558 |
253,787 | fbthrift | c5d6e07588cd03061bc54d451a7fa6e84883d62b | https://github.com/facebook/fbthrift | https://github.com/facebook/fbthrift/commit/c5d6e07588cd03061bc54d451a7fa6e84883d62b | Throw on bad types during skipping data
Summary:
The current code silently returns on bad types. In case when we have an invalid data, we may get a container of a large size with a bad type, this would lead to us running long loop doing nothing (though we already can say that the data is invalid).
The new code would ... | 0 | void skip(Protocol_& prot, TType arg_type) {
switch (arg_type) {
case TType::T_BOOL: {
bool boolv;
prot.readBool(boolv);
return;
}
case TType::T_BYTE: {
int8_t bytev;
prot.readByte(bytev);
return;
}
case TType::T_I16: {
int16_t i16;
prot.readI16(i16)... | 140,635,818,320,978,700,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2019-3558 | Python Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.02.... | https://nvd.nist.gov/vuln/detail/CVE-2019-3558 |
197,145 | tensorflow | c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5 | Fix the segfault in `tf.raw_ops.SparseCountSparseOutput`.
PiperOrigin-RevId: 369264941
Change-Id: I23a96a15b8370c01ee21ba3841e1c7dcbf55e93d | 1 | void Compute(OpKernelContext* context) override {
const Tensor& indices = context->input(0);
const Tensor& values = context->input(1);
const Tensor& shape = context->input(2);
const Tensor& weights = context->input(3);
bool use_weights = weights.NumElements() > 0;
OP_REQUIRES(context, TensorS... | 190,489,503,956,419,350,000,000,000,000,000,000,000 | count_ops.cc | 121,588,050,180,998,330,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-29521 | TensorFlow is an end-to-end open source platform for machine learning. Specifying a negative dense shape in `tf.raw_ops.SparseCountSparseOutput` results in a segmentation fault being thrown out from the standard library as `std::vector` invariants are broken. This is because the implementation(https://github.com/tensor... | https://nvd.nist.gov/vuln/detail/CVE-2021-29521 |
254,048 | tensorflow | c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5 | Fix the segfault in `tf.raw_ops.SparseCountSparseOutput`.
PiperOrigin-RevId: 369264941
Change-Id: I23a96a15b8370c01ee21ba3841e1c7dcbf55e93d | 0 | void Compute(OpKernelContext* context) override {
const Tensor& indices = context->input(0);
const Tensor& values = context->input(1);
const Tensor& shape = context->input(2);
const Tensor& weights = context->input(3);
bool use_weights = weights.NumElements() > 0;
OP_REQUIRES(context, TensorS... | 86,708,936,283,314,160,000,000,000,000,000,000,000 | count_ops.cc | 62,835,234,415,593,940,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-29521 | TensorFlow is an end-to-end open source platform for machine learning. Specifying a negative dense shape in `tf.raw_ops.SparseCountSparseOutput` results in a segmentation fault being thrown out from the standard library as `std::vector` invariants are broken. This is because the implementation(https://github.com/tensor... | https://nvd.nist.gov/vuln/detail/CVE-2021-29521 |
197,161 | gpac | 7f060bbb72966cae80d6fee338d0b07fa3fc06e1 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/7f060bbb72966cae80d6fee338d0b07fa3fc06e1 | fixed #2159 | 1 | int avi_parse_input_file(avi_t *AVI, int getIndex)
{
int i, rate, scale, idx_type;
s64 n;
unsigned char *hdrl_data;
u64 header_offset=0;
int hdrl_len=0;
int nvi, nai[AVI_MAX_TRACKS], ioff;
u64 tot[AVI_MAX_TRACKS];
u32 j;
int lasttag = 0;
int vids_strh_seen = 0;
int vids_strf_seen = 0;
int auds_strh_seen = 0... | 182,814,472,798,175,270,000,000,000,000,000,000,000 | avilib.c | 162,156,913,617,448,900,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2022-1222 | Inf loop in GitHub repository gpac/gpac prior to 2.1.0-DEV. | https://nvd.nist.gov/vuln/detail/CVE-2022-1222 |
254,202 | gpac | 7f060bbb72966cae80d6fee338d0b07fa3fc06e1 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/7f060bbb72966cae80d6fee338d0b07fa3fc06e1 | fixed #2159 | 0 | int avi_parse_input_file(avi_t *AVI, int getIndex)
{
int rate, scale, idx_type;
s64 n, i;
unsigned char *hdrl_data;
u64 header_offset=0;
int hdrl_len=0;
int nvi, nai[AVI_MAX_TRACKS], ioff;
u64 tot[AVI_MAX_TRACKS];
u32 j;
int lasttag = 0;
int vids_strh_seen = 0;
int vids_strf_seen = 0;
int auds_strh_seen = 0... | 112,695,742,349,006,270,000,000,000,000,000,000,000 | avilib.c | 226,521,080,014,180,300,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2022-1222 | Inf loop in GitHub repository gpac/gpac prior to 2.1.0-DEV. | https://nvd.nist.gov/vuln/detail/CVE-2022-1222 |
197,168 | radare2 | e9ce0d64faf19fa4e9c260250fbdf25e3c11e152 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/e9ce0d64faf19fa4e9c260250fbdf25e3c11e152 | Fix #10498 - Fix crash in fuzzed java files (#10511) | 1 | R_API RBinJavaAttrInfo *r_bin_java_line_number_table_attr_new(ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut32 i = 0;
ut64 curpos, offset = 0;
RBinJavaLineNumberAttribute *lnattr;
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (buffer, sz, buf_offset);
if (!attr) {
return NULL;
}
offset += 6;
attr->type = ... | 36,968,382,688,590,454,000,000,000,000,000,000,000 | class.c | 99,954,488,010,862,210,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14017 | The r_bin_java_annotation_new function in shlr/java/class.c in radare2 2.7.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted .class file because of missing input validation in r_bin_java_line_number_table_attr_new. | https://nvd.nist.gov/vuln/detail/CVE-2018-14017 |
254,492 | radare2 | e9ce0d64faf19fa4e9c260250fbdf25e3c11e152 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/e9ce0d64faf19fa4e9c260250fbdf25e3c11e152 | Fix #10498 - Fix crash in fuzzed java files (#10511) | 0 | R_API RBinJavaAttrInfo *r_bin_java_line_number_table_attr_new(ut8 *buffer, ut64 sz, ut64 buf_offset) {
ut32 i = 0;
ut64 curpos, offset = 0;
RBinJavaLineNumberAttribute *lnattr;
RBinJavaAttrInfo *attr = r_bin_java_default_attr_new (buffer, sz, buf_offset);
if (!attr) {
return NULL;
}
offset += 6;
attr->type = ... | 97,814,754,759,456,600,000,000,000,000,000,000,000 | class.c | 72,856,353,359,130,070,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14017 | The r_bin_java_annotation_new function in shlr/java/class.c in radare2 2.7.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted .class file because of missing input validation in r_bin_java_line_number_table_attr_new. | https://nvd.nist.gov/vuln/detail/CVE-2018-14017 |
197,180 | linux | 26c191788f18129af0eb32a358cdaea0c7479626 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/26c191788f18129af0eb32a358cdaea0c7479626 | mm: pmd_read_atomic: fix 32bit PAE pmd walk vs pmd_populate SMP race condition
When holding the mmap_sem for reading, pmd_offset_map_lock should only
run on a pmd_t that has been read atomically from the pmdp pointer,
otherwise we may read only half of it leading to this crash.
PID: 11679 TASK: f06e8000 CPU: 3 CO... | 1 | static inline int pmd_none_or_trans_huge_or_clear_bad(pmd_t *pmd)
{
/* depend on compiler for an atomic pmd read */
pmd_t pmdval = *pmd;
/*
* The barrier will stabilize the pmdval in a register or on
* the stack so that it will stop changing under the code.
*/
#ifdef CONFIG_TRANSPARENT_HUGEPAGE
barrier();
#en... | 145,487,643,779,028,000,000,000,000,000,000,000,000 | pgtable.h | 150,671,296,046,232,630,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2012-2373 | The Linux kernel before 3.4.5 on the x86 platform, when Physical Address Extension (PAE) is enabled, does not properly use the Page Middle Directory (PMD), which allows local users to cause a denial of service (panic) via a crafted application that triggers a race condition. | https://nvd.nist.gov/vuln/detail/CVE-2012-2373 |
254,949 | linux | 26c191788f18129af0eb32a358cdaea0c7479626 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/26c191788f18129af0eb32a358cdaea0c7479626 | mm: pmd_read_atomic: fix 32bit PAE pmd walk vs pmd_populate SMP race condition
When holding the mmap_sem for reading, pmd_offset_map_lock should only
run on a pmd_t that has been read atomically from the pmdp pointer,
otherwise we may read only half of it leading to this crash.
PID: 11679 TASK: f06e8000 CPU: 3 CO... | 0 | static inline int pmd_none_or_trans_huge_or_clear_bad(pmd_t *pmd)
{
pmd_t pmdval = pmd_read_atomic(pmd);
/*
* The barrier will stabilize the pmdval in a register or on
* the stack so that it will stop changing under the code.
*/
#ifdef CONFIG_TRANSPARENT_HUGEPAGE
barrier();
#endif
if (pmd_none(pmdval))
retu... | 66,400,466,559,137,100,000,000,000,000,000,000,000 | pgtable.h | 165,079,195,324,499,040,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2012-2373 | The Linux kernel before 3.4.5 on the x86 platform, when Physical Address Extension (PAE) is enabled, does not properly use the Page Middle Directory (PMD), which allows local users to cause a denial of service (panic) via a crafted application that triggers a race condition. | https://nvd.nist.gov/vuln/detail/CVE-2012-2373 |
197,182 | qpdf | 8249a26d69f72b9cda584c14cc3f12769985e481 | https://github.com/qpdf/qpdf | https://github.com/qpdf/qpdf/commit/8249a26d69f72b9cda584c14cc3f12769985e481 | Fix infinite loop in QPDFWriter (fixes #143) | 1 | QPDFWriter::enqueueObject(QPDFObjectHandle object)
{
if (object.isIndirect())
{
if (object.getOwningQPDF() != &(this->pdf))
{
QTC::TC("qpdf", "QPDFWriter foreign object");
throw std::logic_error(
"QPDFObjectHandle from different QPDF found while writing."
... | 39,684,514,263,104,694,000,000,000,000,000,000,000 | QPDFWriter.cc | 646,471,579,170,893,200,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2017-18183 | An issue was discovered in QPDF before 7.0.0. There is an infinite loop in the QPDFWriter::enqueueObject() function in libqpdf/QPDFWriter.cc. | https://nvd.nist.gov/vuln/detail/CVE-2017-18183 |
254,987 | qpdf | 8249a26d69f72b9cda584c14cc3f12769985e481 | https://github.com/qpdf/qpdf | https://github.com/qpdf/qpdf/commit/8249a26d69f72b9cda584c14cc3f12769985e481 | Fix infinite loop in QPDFWriter (fixes #143) | 0 | QPDFWriter::enqueueObject(QPDFObjectHandle object)
{
if (object.isIndirect())
{
if (object.getOwningQPDF() != &(this->pdf))
{
QTC::TC("qpdf", "QPDFWriter foreign object");
throw std::logic_error(
"QPDFObjectHandle from different QPDF found while writing."
... | 43,681,743,633,978,980,000,000,000,000,000,000,000 | QPDFWriter.cc | 181,649,698,167,519,400,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2017-18183 | An issue was discovered in QPDF before 7.0.0. There is an infinite loop in the QPDFWriter::enqueueObject() function in libqpdf/QPDFWriter.cc. | https://nvd.nist.gov/vuln/detail/CVE-2017-18183 |
197,187 | libebml | b66ca475be967547af9a3784e720fbbacd381be6 | https://github.com/Matroska-Org/libebml | https://github.com/Matroska-Org/libebml/commit/b66ca475be967547af9a3784e720fbbacd381be6 | Exit the max size loop when there's nothing left possible to find
DataStream.getFilePointer() is not correct in this context. It might force to
exit too early. | 1 | EbmlElement * EbmlElement::FindNextElement(IOCallback & DataStream, const EbmlSemanticContext & Context, int & UpperLevel,
uint64 MaxDataSize, bool AllowDummyElt, unsigned int MaxLowerLevel)
{
int PossibleID_Length = 0;
binary PossibleIdNSize[16];
int PossibleSizeLength;... | 274,815,472,480,988,570,000,000,000,000,000,000,000 | EbmlElement.cpp | 78,244,485,862,717,870,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-13615 | libebml before 1.3.6, as used in the MKV module in VideoLAN VLC Media Player binaries before 3.0.3, has a heap-based buffer over-read in EbmlElement::FindNextElement. | https://nvd.nist.gov/vuln/detail/CVE-2019-13615 |
255,042 | libebml | b66ca475be967547af9a3784e720fbbacd381be6 | https://github.com/Matroska-Org/libebml | https://github.com/Matroska-Org/libebml/commit/b66ca475be967547af9a3784e720fbbacd381be6 | Exit the max size loop when there's nothing left possible to find
DataStream.getFilePointer() is not correct in this context. It might force to
exit too early. | 0 | EbmlElement * EbmlElement::FindNextElement(IOCallback & DataStream, const EbmlSemanticContext & Context, int & UpperLevel,
uint64 MaxDataSize, bool AllowDummyElt, unsigned int MaxLowerLevel)
{
int PossibleID_Length = 0;
binary PossibleIdNSize[16];
int PossibleSizeLength;... | 199,624,769,106,325,700,000,000,000,000,000,000,000 | EbmlElement.cpp | 255,747,108,633,907,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-13615 | libebml before 1.3.6, as used in the MKV module in VideoLAN VLC Media Player binaries before 3.0.3, has a heap-based buffer over-read in EbmlElement::FindNextElement. | https://nvd.nist.gov/vuln/detail/CVE-2019-13615 |
197,189 | ImageMagick | eedd0c35bb2d8af7aa05f215689fdebd11633fa1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/eedd0c35bb2d8af7aa05f215689fdebd11633fa1 | Prevent buffer overflow in SIXEL, PDB, MAP, and CALS coders (bug report from Donghai Zhu) | 1 | static MagickBooleanType WritePDBImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
const char
*comment;
int
bits;
MagickBooleanType
status;
PDBImage
pdb_image;
PDBInfo
pdb_info;
QuantumInfo
*quantum_info;
register const Quantum
*p;
register ... | 279,062,322,735,339,700,000,000,000,000,000,000,000 | pdb.c | 21,599,980,401,787,287,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-10054 | Buffer overflow in the WriteMAPImage function in coders/map.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10054 |
255,068 | ImageMagick | eedd0c35bb2d8af7aa05f215689fdebd11633fa1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/eedd0c35bb2d8af7aa05f215689fdebd11633fa1 | Prevent buffer overflow in SIXEL, PDB, MAP, and CALS coders (bug report from Donghai Zhu) | 0 | static MagickBooleanType WritePDBImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
const char
*comment;
int
bits;
MagickBooleanType
status;
PDBImage
pdb_image;
PDBInfo
pdb_info;
QuantumInfo
*quantum_info;
register const Quantum
*p;
register ... | 309,202,052,134,530,030,000,000,000,000,000,000,000 | pdb.c | 77,881,582,407,780,980,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-10054 | Buffer overflow in the WriteMAPImage function in coders/map.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10054 |
197,199 | tensorflow | 0575b640091680cfb70f4dd93e70658de43b94f9 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9 | Prevent division by 0 in LSH projection.
PiperOrigin-RevId: 387225857
Change-Id: Iaeb572a763618c64f503e0026f6dd9fd769bf50c | 1 | TfLiteStatus Resize(TfLiteContext* context, TfLiteNode* node) {
auto* params =
reinterpret_cast<TfLiteLSHProjectionParams*>(node->builtin_data);
TF_LITE_ENSURE(context, NumInputs(node) == 2 || NumInputs(node) == 3);
TF_LITE_ENSURE_EQ(context, NumOutputs(node), 1);
const TfLiteTensor* hash;
TF_LITE_ENSU... | 256,390,673,687,195,580,000,000,000,000,000,000,000 | lsh_projection.cc | 153,559,093,443,118,610,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-37691 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can craft a TFLite model that would trigger a division by zero error in LSH [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/lsh_projecti... | https://nvd.nist.gov/vuln/detail/CVE-2021-37691 |
255,132 | tensorflow | 0575b640091680cfb70f4dd93e70658de43b94f9 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9 | Prevent division by 0 in LSH projection.
PiperOrigin-RevId: 387225857
Change-Id: Iaeb572a763618c64f503e0026f6dd9fd769bf50c | 0 | TfLiteStatus Resize(TfLiteContext* context, TfLiteNode* node) {
auto* params =
reinterpret_cast<TfLiteLSHProjectionParams*>(node->builtin_data);
TF_LITE_ENSURE(context, NumInputs(node) == 2 || NumInputs(node) == 3);
TF_LITE_ENSURE_EQ(context, NumOutputs(node), 1);
const TfLiteTensor* hash;
TF_LITE_ENSU... | 61,047,529,744,970,490,000,000,000,000,000,000,000 | lsh_projection.cc | 253,963,266,268,271,630,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-37691 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can craft a TFLite model that would trigger a division by zero error in LSH [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/lsh_projecti... | https://nvd.nist.gov/vuln/detail/CVE-2021-37691 |
197,203 | hhvm | 65c95a01541dd2fbc9c978ac53bed235b5376686 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/65c95a01541dd2fbc9c978ac53bed235b5376686 | ZipArchive::extractTo bug 70350
Summary:Don't allow upward directory traversal when extracting zip archive files.
Files in zip files with `..` or starting at main root `/` should be normalized
to something where the file being extracted winds up within the directory or
a subdirectory where the actual extraction is ta... | 1 | static bool extractFileTo(zip* zip, const std::string &file, std::string& to,
char* buf, size_t len) {
auto sep = file.rfind('/');
if (sep != std::string::npos) {
auto path = to + file.substr(0, sep);
if (!HHVM_FN(is_dir)(path) && !HHVM_FN(mkdir)(path, 0777, true)) {
return f... | 13,898,185,252,544,740,000,000,000,000,000,000,000 | ext_zip.cpp | 155,306,919,412,043,480,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2014-9767 | Directory traversal vulnerability in the ZipArchive::extractTo function in ext/zip/php_zip.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 and ext/zip/ext_zip.cpp in HHVM before 3.12.1 allows remote attackers to create arbitrary empty directories via a crafted ZIP archive. | https://nvd.nist.gov/vuln/detail/CVE-2014-9767 |
255,314 | hhvm | 65c95a01541dd2fbc9c978ac53bed235b5376686 | https://github.com/facebook/hhvm | https://github.com/facebook/hhvm/commit/65c95a01541dd2fbc9c978ac53bed235b5376686 | ZipArchive::extractTo bug 70350
Summary:Don't allow upward directory traversal when extracting zip archive files.
Files in zip files with `..` or starting at main root `/` should be normalized
to something where the file being extracted winds up within the directory or
a subdirectory where the actual extraction is ta... | 0 | static bool extractFileTo(zip* zip, const std::string &file, std::string& to,
char* buf, size_t len) {
struct zip_stat zipStat;
// Verify the file to be extracted is actually in the zip file
if (zip_stat(zip, file.c_str(), 0, &zipStat) != 0) {
return false;
}
auto clean_file = ... | 149,449,384,430,228,100,000,000,000,000,000,000,000 | ext_zip.cpp | 8,306,773,405,976,529,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2014-9767 | Directory traversal vulnerability in the ZipArchive::extractTo function in ext/zip/php_zip.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 and ext/zip/ext_zip.cpp in HHVM before 3.12.1 allows remote attackers to create arbitrary empty directories via a crafted ZIP archive. | https://nvd.nist.gov/vuln/detail/CVE-2014-9767 |
197,232 | njs | 222d6fdcf0c6485ec8e175f3a7b70d650c234b4e | https://github.com/nginx/njs | https://github.com/nginx/njs/commit/222d6fdcf0c6485ec8e175f3a7b70d650c234b4e | Fixed njs_vmcode_interpreter() when "toString" conversion fails.
Previously, while interpreting a user function, njs_vmcode_interpreter()
might return prematurely when an error happens. This is not correct
because the current frame has to be unwound (or exception caught)
first.
The fix is exit through only 5 appropr... | 1 | njs_vmcode_interpreter(njs_vm_t *vm, u_char *pc, void *promise_cap,
void *async_ctx)
{
u_char *catch;
double num, exponent;
int32_t i32;
uint32_t u32;
njs_str_t string;
njs_uint_t ... | 286,455,519,617,131,670,000,000,000,000,000,000,000 | njs_vmcode.c | 42,172,727,494,157,793,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-29369 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation via njs_lvlhsh_bucket_find at njs_lvlhsh.c. | https://nvd.nist.gov/vuln/detail/CVE-2022-29369 |
255,717 | njs | 222d6fdcf0c6485ec8e175f3a7b70d650c234b4e | https://github.com/nginx/njs | https://github.com/nginx/njs/commit/222d6fdcf0c6485ec8e175f3a7b70d650c234b4e | Fixed njs_vmcode_interpreter() when "toString" conversion fails.
Previously, while interpreting a user function, njs_vmcode_interpreter()
might return prematurely when an error happens. This is not correct
because the current frame has to be unwound (or exception caught)
first.
The fix is exit through only 5 appropr... | 0 | njs_vmcode_interpreter(njs_vm_t *vm, u_char *pc, void *promise_cap,
void *async_ctx)
{
u_char *catch;
double num, exponent;
int32_t i32;
uint32_t u32;
njs_str_t string;
njs_uint_t ... | 92,429,476,583,501,520,000,000,000,000,000,000,000 | njs_vmcode.c | 46,247,608,200,013,710,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-29369 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation via njs_lvlhsh_bucket_find at njs_lvlhsh.c. | https://nvd.nist.gov/vuln/detail/CVE-2022-29369 |
197,241 | ImageMagick | bfb7915d4b2e11acb6a819e451c382dc645277db | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db | https://github.com/ImageMagick/ImageMagick/issues/553 | 1 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
register Quantum *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
u... | 170,010,179,054,958,210,000,000,000,000,000,000,000 | mat.c | 21,411,120,556,536,383,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2017-12667 | ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMATImage in coders\mat.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12667 |
255,804 | ImageMagick | bfb7915d4b2e11acb6a819e451c382dc645277db | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/bfb7915d4b2e11acb6a819e451c382dc645277db | https://github.com/ImageMagick/ImageMagick/issues/553 | 0 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
register Quantum *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
u... | 293,943,238,025,077,700,000,000,000,000,000,000,000 | mat.c | 291,028,961,151,700,070,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2017-12667 | ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMATImage in coders\mat.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12667 |
197,244 | tensorflow | 67784700869470d65d5f2ef20aeb5e97c31673cb | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb | Prevent division by 0 in `QuantizedBiasAdd`.
PiperOrigin-RevId: 370117454
Change-Id: I3804e2ac8dcc6d3afcc92e27853e2325a017ca4d | 1 | void Compute(OpKernelContext* context) override {
const Tensor& input = context->input(0);
const Tensor& bias = context->input(1);
const float input_min = context->input(2).flat<float>()(0);
const float input_max = context->input(3).flat<float>()(0);
const float bias_min = context->input(4).flat<f... | 168,934,142,025,237,570,000,000,000,000,000,000,000 | quantized_bias_add_op.cc | 230,724,270,983,057,300,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-29546 | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger an integer division by zero undefined behavior in `tf.raw_ops.QuantizedBiasAdd`. This is because the implementation of the Eigen kernel(https://github.com/tensorflow/tensorflow/blob/61bca8bd5ba8a68b2d97435ddfafcdf2b85672cd/te... | https://nvd.nist.gov/vuln/detail/CVE-2021-29546 |
255,874 | tensorflow | 67784700869470d65d5f2ef20aeb5e97c31673cb | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb | Prevent division by 0 in `QuantizedBiasAdd`.
PiperOrigin-RevId: 370117454
Change-Id: I3804e2ac8dcc6d3afcc92e27853e2325a017ca4d | 0 | void Compute(OpKernelContext* context) override {
const Tensor& input = context->input(0);
const Tensor& bias = context->input(1);
const float input_min = context->input(2).flat<float>()(0);
const float input_max = context->input(3).flat<float>()(0);
const float bias_min = context->input(4).flat<f... | 136,893,415,407,876,330,000,000,000,000,000,000,000 | quantized_bias_add_op.cc | 196,399,606,718,658,150,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-29546 | TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger an integer division by zero undefined behavior in `tf.raw_ops.QuantizedBiasAdd`. This is because the implementation of the Eigen kernel(https://github.com/tensorflow/tensorflow/blob/61bca8bd5ba8a68b2d97435ddfafcdf2b85672cd/te... | https://nvd.nist.gov/vuln/detail/CVE-2021-29546 |
197,245 | u-boot | 5d14ee4e53a81055d34ba280cb8fd90330f22a96 | https://github.com/u-boot/u-boot | https://github.com/u-boot/u-boot/commit/5d14ee4e53a81055d34ba280cb8fd90330f22a96 | CVE-2019-14196: nfs: fix unbounded memcpy with a failed length check at nfs_lookup_reply
This patch adds a check to rpc_pkt.u.reply.data at nfs_lookup_reply.
Signed-off-by: Cheng Liu <liucheng32@huawei.com>
Reported-by: Fermín Serna <fermin@semmle.com>
Acked-by: Joe Hershberger <joe.hershberger@ni.com> | 1 | static int nfs_lookup_reply(uchar *pkt, unsigned len)
{
struct rpc_t rpc_pkt;
debug("%s\n", __func__);
memcpy(&rpc_pkt.u.data[0], pkt, len);
if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
return -NFS_RPC_ERR;
else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
return -NFS_RPC_DROP;
if (rpc_pkt.u.reply.rstatus ||
... | 175,393,033,798,933,700,000,000,000,000,000,000,000 | nfs.c | 306,096,762,258,887,520,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-30767 | nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196. | https://nvd.nist.gov/vuln/detail/CVE-2022-30767 |
255,891 | u-boot | 5d14ee4e53a81055d34ba280cb8fd90330f22a96 | https://github.com/u-boot/u-boot | https://github.com/u-boot/u-boot/commit/5d14ee4e53a81055d34ba280cb8fd90330f22a96 | CVE-2019-14196: nfs: fix unbounded memcpy with a failed length check at nfs_lookup_reply
This patch adds a check to rpc_pkt.u.reply.data at nfs_lookup_reply.
Signed-off-by: Cheng Liu <liucheng32@huawei.com>
Reported-by: Fermín Serna <fermin@semmle.com>
Acked-by: Joe Hershberger <joe.hershberger@ni.com> | 0 | static int nfs_lookup_reply(uchar *pkt, unsigned len)
{
struct rpc_t rpc_pkt;
debug("%s\n", __func__);
memcpy(&rpc_pkt.u.data[0], pkt, len);
if (ntohl(rpc_pkt.u.reply.id) > rpc_id)
return -NFS_RPC_ERR;
else if (ntohl(rpc_pkt.u.reply.id) < rpc_id)
return -NFS_RPC_DROP;
if (rpc_pkt.u.reply.rstatus ||
... | 66,169,846,120,933,175,000,000,000,000,000,000,000 | nfs.c | 114,322,917,047,956,380,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-30767 | nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196. | https://nvd.nist.gov/vuln/detail/CVE-2022-30767 |
197,265 | mruby | ff3a5ebed6ffbe3e70481531cfb969b497aa73ad | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad | vm.c: should check type before hash access.
Since the operand of double splat (`**`) may not be a hash, simple
assertion (previous code since d42a64e) was not enough for this case. | 1 | mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc)
{
/* mrb_assert(MRB_PROC_CFUNC_P(proc)) */
const mrb_irep *irep = proc->body.irep;
const mrb_pool_value *pool = irep->pool;
const mrb_sym *syms = irep->syms;
mrb_code insn;
int ai = mrb_gc_arena_save(mrb);
struct mrb_jmpbuf *prev_jm... | 40,355,757,585,165,720,000,000,000,000,000,000,000 | None | null | [
"CWE-94"
] | CVE-2022-0630 | Out-of-bounds Read in Homebrew mruby prior to 3.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0630 |
256,190 | mruby | ff3a5ebed6ffbe3e70481531cfb969b497aa73ad | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad | vm.c: should check type before hash access.
Since the operand of double splat (`**`) may not be a hash, simple
assertion (previous code since d42a64e) was not enough for this case. | 0 | mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc)
{
/* mrb_assert(MRB_PROC_CFUNC_P(proc)) */
const mrb_irep *irep = proc->body.irep;
const mrb_pool_value *pool = irep->pool;
const mrb_sym *syms = irep->syms;
mrb_code insn;
int ai = mrb_gc_arena_save(mrb);
struct mrb_jmpbuf *prev_jm... | 328,761,082,779,574,520,000,000,000,000,000,000,000 | vm.c | 245,302,474,447,219,380,000,000,000,000,000,000,000 | [
"CWE-94"
] | CVE-2022-0630 | Out-of-bounds Read in Homebrew mruby prior to 3.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0630 |
197,268 | folly | 8e927ee48b114c8a2f90d0cbd5ac753795a6761f | https://github.com/facebook/folly | https://github.com/facebook/folly/commit/8e927ee48b114c8a2f90d0cbd5ac753795a6761f | Flush secureRandom buffer on fork
Summary: On fork, flush the secureRandom buffer, so that we don't share entropy between the parent and child.
Reviewed By: ricklavoie
Differential Revision: D9196474
fbshipit-source-id: 12ff8488d814466186df61328a5f1d4000beb27f | 1 | BufferedRandomDevice::BufferedRandomDevice(size_t bufferSize)
: bufferSize_(bufferSize),
buffer_(new unsigned char[bufferSize]),
ptr_(buffer_.get() + bufferSize) { // refill on first use
} | 333,690,537,657,707,900,000,000,000,000,000,000,000 | Random.cpp | 104,763,720,907,080,690,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-6337 | folly::secureRandom will re-use a buffer between parent and child processes when fork() is called. That will result in multiple forked children producing repeat (or similar) results. This affects HHVM 3.26 prior to 3.26.3 and the folly library between v2017.12.11.00 and v2018.08.09.00. | https://nvd.nist.gov/vuln/detail/CVE-2018-6337 |
256,203 | folly | 8e927ee48b114c8a2f90d0cbd5ac753795a6761f | https://github.com/facebook/folly | https://github.com/facebook/folly/commit/8e927ee48b114c8a2f90d0cbd5ac753795a6761f | Flush secureRandom buffer on fork
Summary: On fork, flush the secureRandom buffer, so that we don't share entropy between the parent and child.
Reviewed By: ricklavoie
Differential Revision: D9196474
fbshipit-source-id: 12ff8488d814466186df61328a5f1d4000beb27f | 0 | BufferedRandomDevice::BufferedRandomDevice(size_t bufferSize)
: bufferSize_(bufferSize),
buffer_(new unsigned char[bufferSize]),
ptr_(buffer_.get() + bufferSize) { // refill on first use
call_once(flag, [this]() {
detail::AtFork::registerHandler(
this,
/*prepare*/ []() { return true; },... | 318,680,405,672,216,050,000,000,000,000,000,000,000 | Random.cpp | 135,357,240,942,157,330,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-6337 | folly::secureRandom will re-use a buffer between parent and child processes when fork() is called. That will result in multiple forked children producing repeat (or similar) results. This affects HHVM 3.26 prior to 3.26.3 and the folly library between v2017.12.11.00 and v2018.08.09.00. | https://nvd.nist.gov/vuln/detail/CVE-2018-6337 |
197,275 | FFmpeg | 7150f9575671f898382c370acae35f9087a30ba1 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1 | avcodec/dnxhddec: check and propagate function return value
Similar to CVE-2013-0868, here return value check for 'init_vlc' is needed.
crafted DNxHD data can cause unspecified impact.
Reviewed-by: Paul B Mahol <onemda@gmail.com>
Signed-off-by: James Almer <jamrial@gmail.com> | 1 | static int dnxhd_init_vlc(DNXHDContext *ctx, uint32_t cid, int bitdepth)
{
if (cid != ctx->cid) {
const CIDEntry *cid_table = ff_dnxhd_get_cid_table(cid);
if (!cid_table) {
av_log(ctx->avctx, AV_LOG_ERROR, "unsupported cid %"PRIu32"\n", cid);
return AVERROR(ENOSYS);
... | 228,872,422,139,476,770,000,000,000,000,000,000,000 | dnxhddec.c | 74,187,829,426,165,405,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-38114 | libavcodec/dnxhddec.c in FFmpeg 4.4 does not check the return value of the init_vlc function, a similar issue to CVE-2013-0868. | https://nvd.nist.gov/vuln/detail/CVE-2021-38114 |
256,261 | FFmpeg | 7150f9575671f898382c370acae35f9087a30ba1 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1 | avcodec/dnxhddec: check and propagate function return value
Similar to CVE-2013-0868, here return value check for 'init_vlc' is needed.
crafted DNxHD data can cause unspecified impact.
Reviewed-by: Paul B Mahol <onemda@gmail.com>
Signed-off-by: James Almer <jamrial@gmail.com> | 0 | static int dnxhd_init_vlc(DNXHDContext *ctx, uint32_t cid, int bitdepth)
{
int ret;
if (cid != ctx->cid) {
const CIDEntry *cid_table = ff_dnxhd_get_cid_table(cid);
if (!cid_table) {
av_log(ctx->avctx, AV_LOG_ERROR, "unsupported cid %"PRIu32"\n", cid);
return AVERROR(ENOS... | 125,330,292,610,795,950,000,000,000,000,000,000,000 | dnxhddec.c | 64,757,760,924,864,085,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-38114 | libavcodec/dnxhddec.c in FFmpeg 4.4 does not check the return value of the init_vlc function, a similar issue to CVE-2013-0868. | https://nvd.nist.gov/vuln/detail/CVE-2021-38114 |
197,276 | uftpd | 455b47d3756aed162d2d0ef7f40b549f3b5b30fe | https://github.com/troglobit/uftpd | https://github.com/troglobit/uftpd/commit/455b47d3756aed162d2d0ef7f40b549f3b5b30fe | FTP/TFTP: Fix directory traversal regression, reported by Aaron Esau
Signed-off-by: Joachim Nilsson <troglobit@gmail.com> | 1 | char *compose_path(ctrl_t *ctrl, char *path)
{
struct stat st;
static char rpath[PATH_MAX];
char *name, *ptr;
char dir[PATH_MAX] = { 0 };
strlcpy(dir, ctrl->cwd, sizeof(dir));
DBG("Compose path from cwd: %s, arg: %s", ctrl->cwd, path ?: "");
if (!path || !strlen(path))
goto check;
if (path) {
if (path[0] ... | 232,884,872,620,448,500,000,000,000,000,000,000,000 | common.c | 323,139,752,167,784,340,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2020-5221 | In uftpd before 2.11, it is possible for an unauthenticated user to perform a directory traversal attack using multiple different FTP commands and read and write to arbitrary locations on the filesystem due to the lack of a well-written chroot jail in compose_abspath(). This has been fixed in version 2.11 | https://nvd.nist.gov/vuln/detail/CVE-2020-5221 |
256,271 | uftpd | 455b47d3756aed162d2d0ef7f40b549f3b5b30fe | https://github.com/troglobit/uftpd | https://github.com/troglobit/uftpd/commit/455b47d3756aed162d2d0ef7f40b549f3b5b30fe | FTP/TFTP: Fix directory traversal regression, reported by Aaron Esau
Signed-off-by: Joachim Nilsson <troglobit@gmail.com> | 0 | char *compose_path(ctrl_t *ctrl, char *path)
{
struct stat st;
static char rpath[PATH_MAX];
char *name, *ptr;
char dir[PATH_MAX] = { 0 };
strlcpy(dir, ctrl->cwd, sizeof(dir));
DBG("Compose path from cwd: %s, arg: %s", ctrl->cwd, path ?: "");
if (!path || !strlen(path))
goto check;
if (path) {
if (path[0] ... | 8,378,340,990,506,518,000,000,000,000,000,000,000 | common.c | 202,216,236,885,619,800,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2020-5221 | In uftpd before 2.11, it is possible for an unauthenticated user to perform a directory traversal attack using multiple different FTP commands and read and write to arbitrary locations on the filesystem due to the lack of a well-written chroot jail in compose_abspath(). This has been fixed in version 2.11 | https://nvd.nist.gov/vuln/detail/CVE-2020-5221 |
197,314 | ytnef | f98f5d4adc1c4bd4033638f6167c1bb95d642f89 | https://github.com/Yeraze/ytnef | https://github.com/Yeraze/ytnef/commit/f98f5d4adc1c4bd4033638f6167c1bb95d642f89 | BugFix - data length
Even tho this is a "LONG" type, it's actually only 4 bytes. Typecasting
it to a long* caused a dereference beyond the end of the allocated
region.
issues#28 | 1 | void MAPIPrint(MAPIProps *p) {
int j, i, index, h, x;
DDWORD *ddword_ptr;
DDWORD ddword_tmp;
dtr thedate;
MAPIProperty *mapi;
variableLength *mapidata;
variableLength vlTemp;
int found;
for (j = 0; j < p->count; j++) {
mapi = &(p->properties[j]);
printf(" #%i: Type: [", j);
switch (PROP... | 286,381,960,866,207,050,000,000,000,000,000,000,000 | ytnef.c | 19,437,460,197,353,687,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-6800 | An issue was discovered in ytnef before 1.9.2. An invalid memory access (heap-based buffer over-read) can occur during handling of LONG data types, related to MAPIPrint() in libytnef. | https://nvd.nist.gov/vuln/detail/CVE-2017-6800 |
256,483 | ytnef | f98f5d4adc1c4bd4033638f6167c1bb95d642f89 | https://github.com/Yeraze/ytnef | https://github.com/Yeraze/ytnef/commit/f98f5d4adc1c4bd4033638f6167c1bb95d642f89 | BugFix - data length
Even tho this is a "LONG" type, it's actually only 4 bytes. Typecasting
it to a long* caused a dereference beyond the end of the allocated
region.
issues#28 | 0 | void MAPIPrint(MAPIProps *p) {
int j, i, index, h, x;
DDWORD *ddword_ptr;
DDWORD ddword_tmp;
dtr thedate;
MAPIProperty *mapi;
variableLength *mapidata;
variableLength vlTemp;
int found;
for (j = 0; j < p->count; j++) {
mapi = &(p->properties[j]);
printf(" #%i: Type: [", j);
switch (PROP... | 285,861,814,014,575,000,000,000,000,000,000,000,000 | ytnef.c | 168,485,647,867,116,590,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-6800 | An issue was discovered in ytnef before 1.9.2. An invalid memory access (heap-based buffer over-read) can occur during handling of LONG data types, related to MAPIPrint() in libytnef. | https://nvd.nist.gov/vuln/detail/CVE-2017-6800 |
197,325 | exiv2 | e925bc5addd881543fa503470c8a859e112cca62 | https://github.com/Exiv2/exiv2 | https://github.com/Exiv2/exiv2/commit/e925bc5addd881543fa503470c8a859e112cca62 | Fix integer overflow by checking size against header_size
Note that the problem occurs when data_size is less than header_size
what causes a buffer overflow in &data[i]
Co-Authored-By: D4N <dan.cermak@cgc-instruments.com> | 1 | long WebPImage::getHeaderOffset(byte *data, long data_size,
byte *header, long header_size) {
long pos = -1;
for (long i=0; i < data_size - header_size; i++) {
if (memcmp(header, &data[i], header_size) == 0) {
pos = i;
b... | 188,667,667,130,256,500,000,000,000,000,000,000,000 | webpimage.cpp | 188,228,762,631,251,350,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2019-14982 | In Exiv2 before v0.27.2, there is an integer overflow vulnerability in the WebPImage::getHeaderOffset function in webpimage.cpp. It can lead to a buffer overflow vulnerability and a crash. | https://nvd.nist.gov/vuln/detail/CVE-2019-14982 |
256,931 | exiv2 | e925bc5addd881543fa503470c8a859e112cca62 | https://github.com/Exiv2/exiv2 | https://github.com/Exiv2/exiv2/commit/e925bc5addd881543fa503470c8a859e112cca62 | Fix integer overflow by checking size against header_size
Note that the problem occurs when data_size is less than header_size
what causes a buffer overflow in &data[i]
Co-Authored-By: D4N <dan.cermak@cgc-instruments.com> | 0 | long WebPImage::getHeaderOffset(byte* data, long data_size, byte* header, long header_size)
{
if (data_size < header_size) { return -1; }
long pos = -1;
for (long i=0; i < data_size - header_size; i++) {
if (memcmp(header, &data[i], header_size) == 0) {
pos = ... | 203,589,531,512,520,800,000,000,000,000,000,000,000 | webpimage.cpp | 37,303,076,579,972,948,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2019-14982 | In Exiv2 before v0.27.2, there is an integer overflow vulnerability in the WebPImage::getHeaderOffset function in webpimage.cpp. It can lead to a buffer overflow vulnerability and a crash. | https://nvd.nist.gov/vuln/detail/CVE-2019-14982 |
197,332 | gpac | 9ea93a2ec8f555ceed1ee27294cf94822f14f10f | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/9ea93a2ec8f555ceed1ee27294cf94822f14f10f | fixed #2165 | 1 | static u8 BS_ReadByte(GF_BitStream *bs)
{
Bool is_eos;
if (bs->bsmode == GF_BITSTREAM_READ) {
u8 res;
if (bs->position >= bs->size) {
if (bs->EndOfStream) bs->EndOfStream(bs->par);
if (!bs->overflow_state) bs->overflow_state = 1;
return 0;
}
res = bs->original[bs->position++];
if (bs->remove_emul_... | 258,348,097,499,616,580,000,000,000,000,000,000,000 | bitstream.c | 242,741,403,566,242,370,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-29339 | In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() in utils/bitstream.c has a failed assertion, which causes a Denial of Service. This vulnerability was fixed in commit 9ea93a2. | https://nvd.nist.gov/vuln/detail/CVE-2022-29339 |
257,027 | gpac | 9ea93a2ec8f555ceed1ee27294cf94822f14f10f | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/9ea93a2ec8f555ceed1ee27294cf94822f14f10f | fixed #2165 | 0 | static u8 BS_ReadByte(GF_BitStream *bs)
{
Bool is_eos;
if (bs->bsmode == GF_BITSTREAM_READ) {
u8 res;
if (bs->position >= bs->size) {
if (bs->EndOfStream) bs->EndOfStream(bs->par);
if (!bs->overflow_state) bs->overflow_state = 1;
return 0;
}
res = bs->original[bs->position++];
if (bs->remove_emul_... | 54,595,576,418,796,970,000,000,000,000,000,000,000 | bitstream.c | 243,955,531,271,416,000,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-29339 | In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() in utils/bitstream.c has a failed assertion, which causes a Denial of Service. This vulnerability was fixed in commit 9ea93a2. | https://nvd.nist.gov/vuln/detail/CVE-2022-29339 |
197,362 | tensorflow | 482da92095c4d48f8784b1f00dda4f81c28d2988 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988 | Ensure non-empty padding_value input to tf.raw_ops.MatrixDiagPartV2, if a padding_value is input
PiperOrigin-RevId: 388314614
Change-Id: If0b51ad58d5d8543a6be6ce8f42ae4755c80d55f | 1 | void Compute(OpKernelContext* context) override {
const Tensor& input = context->input(0);
// MatrixDiagPart and MatrixDiagPartV2 both use this OpKernel.
// MatrixDiagPart only has one input, so we have to check the number of
// inputs before reading additional parameters in MatrixDiagV2.
int32_t... | 180,063,321,346,241,300,000,000,000,000,000,000,000 | matrix_diag_op.cc | 240,679,363,651,112,140,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-37643 | TensorFlow is an end-to-end open source platform for machine learning. If a user does not provide a valid padding value to `tf.raw_ops.MatrixDiagPartOp`, then the code triggers a null pointer dereference (if input is empty) or produces invalid behavior, ignoring all values after the first. The [implementation](https://... | https://nvd.nist.gov/vuln/detail/CVE-2021-37643 |
257,499 | tensorflow | 482da92095c4d48f8784b1f00dda4f81c28d2988 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/482da92095c4d48f8784b1f00dda4f81c28d2988 | Ensure non-empty padding_value input to tf.raw_ops.MatrixDiagPartV2, if a padding_value is input
PiperOrigin-RevId: 388314614
Change-Id: If0b51ad58d5d8543a6be6ce8f42ae4755c80d55f | 0 | void Compute(OpKernelContext* context) override {
const Tensor& input = context->input(0);
// MatrixDiagPart and MatrixDiagPartV2 both use this OpKernel.
// MatrixDiagPart only has one input, so we have to check the number of
// inputs before reading additional parameters in MatrixDiagV2.
int32_t... | 46,487,731,950,673,150,000,000,000,000,000,000,000 | matrix_diag_op.cc | 193,912,266,163,549,400,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-37643 | TensorFlow is an end-to-end open source platform for machine learning. If a user does not provide a valid padding value to `tf.raw_ops.MatrixDiagPartOp`, then the code triggers a null pointer dereference (if input is empty) or produces invalid behavior, ignoring all values after the first. The [implementation](https://... | https://nvd.nist.gov/vuln/detail/CVE-2021-37643 |
197,363 | ArduinoJson | 5e7b9ec688d79e7b16ec7064e1d37e8481a31e72 | https://github.com/bblanchon/ArduinoJson | https://github.com/bblanchon/ArduinoJson/commit/5e7b9ec688d79e7b16ec7064e1d37e8481a31e72 | Fix buffer overflow (pull request #81) | 1 | char *QuotedString::extractFrom(char *input, char **endPtr) {
char firstChar = *input;
if (!isQuote(firstChar)) {
// must start with a quote
return NULL;
}
char stopChar = firstChar; // closing quote is the same as opening quote
char *startPtr = input + 1; // skip the quote
char *readPtr = star... | 123,470,098,655,216,980,000,000,000,000,000,000,000 | QuotedString.cpp | 312,295,438,448,968,000,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2015-4590 | The extractFrom function in Internals/QuotedString.cpp in Arduino JSON before 4.5 allows remote attackers to cause a denial of service (crash) via a JSON string with a \ (backslash) followed by a terminator, as demonstrated by "\\\0", which triggers a buffer overflow and over-read. | https://nvd.nist.gov/vuln/detail/CVE-2015-4590 |
257,522 | ArduinoJson | 5e7b9ec688d79e7b16ec7064e1d37e8481a31e72 | https://github.com/bblanchon/ArduinoJson | https://github.com/bblanchon/ArduinoJson/commit/5e7b9ec688d79e7b16ec7064e1d37e8481a31e72 | Fix buffer overflow (pull request #81) | 0 | char *QuotedString::extractFrom(char *input, char **endPtr) {
char *startPtr = input + 1; // skip the quote
char *readPtr = startPtr;
char *writePtr = startPtr;
char c;
char firstChar = *input;
char stopChar = firstChar; // closing quote is the same as opening quote
if (!isQuote(firstChar)) goto ERROR... | 334,785,854,878,778,840,000,000,000,000,000,000,000 | QuotedString.cpp | 113,799,451,480,879,990,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2015-4590 | The extractFrom function in Internals/QuotedString.cpp in Arduino JSON before 4.5 allows remote attackers to cause a denial of service (crash) via a JSON string with a \ (backslash) followed by a terminator, as demonstrated by "\\\0", which triggers a buffer overflow and over-read. | https://nvd.nist.gov/vuln/detail/CVE-2015-4590 |
197,364 | nginx | b900cc28fcbb4cf5a32ab62f80b59292e1c85b4b | https://github.com/nginx/nginx | https://github.com/nginx/nginx/commit/b900cc28fcbb4cf5a32ab62f80b59292e1c85b4b | Introduced time truncation to December 31, 9999 (ticket #1368).
Various buffers are allocated in an assumption that there would be
no more than 4 year digits. This might not be true on platforms
with 64-bit time_t, as 64-bit time_t is able to represent more than that.
Such dates with more than 4 year digits hardly ma... | 1 | ngx_gmtime(time_t t, ngx_tm_t *tp)
{
ngx_int_t yday;
ngx_uint_t sec, min, hour, mday, mon, year, wday, days, leap;
/* the calculation is valid for positive time_t only */
if (t < 0) {
t = 0;
}
days = t / 86400;
sec = t % 86400;
/* January 1, 1970 was Thursday */
wday ... | 19,979,745,359,006,220,000,000,000,000,000,000,000 | ngx_times.c | 182,729,847,858,526,040,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-20005 | NGINX before 1.13.6 has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module. | https://nvd.nist.gov/vuln/detail/CVE-2017-20005 |
257,535 | nginx | b900cc28fcbb4cf5a32ab62f80b59292e1c85b4b | https://github.com/nginx/nginx | https://github.com/nginx/nginx/commit/b900cc28fcbb4cf5a32ab62f80b59292e1c85b4b | Introduced time truncation to December 31, 9999 (ticket #1368).
Various buffers are allocated in an assumption that there would be
no more than 4 year digits. This might not be true on platforms
with 64-bit time_t, as 64-bit time_t is able to represent more than that.
Such dates with more than 4 year digits hardly ma... | 0 | ngx_gmtime(time_t t, ngx_tm_t *tp)
{
ngx_int_t yday;
ngx_uint_t sec, min, hour, mday, mon, year, wday, days, leap;
/* the calculation is valid for positive time_t only */
if (t < 0) {
t = 0;
}
days = t / 86400;
sec = t % 86400;
/*
* no more than 4 year digits supporte... | 273,381,176,423,583,200,000,000,000,000,000,000,000 | ngx_times.c | 170,752,296,051,460,300,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-20005 | NGINX before 1.13.6 has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module. | https://nvd.nist.gov/vuln/detail/CVE-2017-20005 |
197,374 | radare2 | 68338b71a563b24e62617bb629059adc0c94b230 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/68338b71a563b24e62617bb629059adc0c94b230 | fix #6872 | 1 | static void dex_parse_debug_item(RBinFile *binfile, RBinDexObj *bin,
RBinDexClass *c, int MI, int MA, int paddr, int ins_size,
int insns_size, char *class_name, int regsz,
int debug_info_off) {
struct r_bin_t *rbin = binfile->rbin;
const ut8 *p4 = r_buf_get_at (binfile->buf, debug_info_off, NULL);
... | 6,420,385,247,302,877,000,000,000,000,000,000,000 | bin_dex.c | 28,439,315,644,437,570,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-6415 | The dex_parse_debug_item function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DEX file. | https://nvd.nist.gov/vuln/detail/CVE-2017-6415 |
257,734 | radare2 | 68338b71a563b24e62617bb629059adc0c94b230 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/68338b71a563b24e62617bb629059adc0c94b230 | fix #6872 | 0 | static void dex_parse_debug_item(RBinFile *binfile, RBinDexObj *bin,
RBinDexClass *c, int MI, int MA, int paddr, int ins_size,
int insns_size, char *class_name, int regsz,
int debug_info_off) {
struct r_bin_t *rbin = binfile->rbin;
const ut8 *p4 = r_buf_get_at (binfile->buf, debug_info_off, NULL);
... | 8,694,805,285,181,804,000,000,000,000,000,000,000 | bin_dex.c | 20,739,617,211,881,278,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-6415 | The dex_parse_debug_item function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DEX file. | https://nvd.nist.gov/vuln/detail/CVE-2017-6415 |
197,398 | freeradius-server | ff94dd35673bba1476594299d31ce8293b8bd223 | https://github.com/alandekok/freeradius-server | http://github.com/alandekok/freeradius-server/commit/ff94dd35673bba1476594299d31ce8293b8bd223 | Do not delete "old" requests until they are free.
If the request is in the queue for 30+ seconds, do NOT delete it.
Instead, mark it as "STOP PROCESSING", and do "wait_for_child_to_die",
which waits for a child thread to pick it up, and acknowledge that it's
done. Once it's marked done, we can finally clean it up.
T... | 1 | static void wait_for_child_to_die(void *ctx)
{
REQUEST *request = ctx;
rad_assert(request->magic == REQUEST_MAGIC);
/*
* If it's still queued (waiting for a thread to pick it
* up) OR, it's running AND there's still a child thread
* handling it, THEN delay some more.
*/
if ((request->child_state == REQUES... | 337,177,024,170,430,160,000,000,000,000,000,000,000 | event.c | 269,819,908,251,073,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2010-3697 | The wait_for_child_to_die function in main/event.c in FreeRADIUS 2.1.x before 2.1.10, in certain circumstances involving long-term database outages, does not properly handle long queue times for requests, which allows remote attackers to cause a denial of service (daemon crash) by sending many requests. | https://nvd.nist.gov/vuln/detail/CVE-2010-3697 |
258,106 | freeradius-server | ff94dd35673bba1476594299d31ce8293b8bd223 | https://github.com/alandekok/freeradius-server | http://github.com/alandekok/freeradius-server/commit/ff94dd35673bba1476594299d31ce8293b8bd223 | Do not delete "old" requests until they are free.
If the request is in the queue for 30+ seconds, do NOT delete it.
Instead, mark it as "STOP PROCESSING", and do "wait_for_child_to_die",
which waits for a child thread to pick it up, and acknowledge that it's
done. Once it's marked done, we can finally clean it up.
T... | 0 | static void wait_for_child_to_die(void *ctx)
{
REQUEST *request = ctx;
rad_assert(request->magic == REQUEST_MAGIC);
remove_from_request_hash(request);
/*
* If it's still queued (waiting for a thread to pick it
* up) OR, it's running AND there's still a child thread
* handling it, THEN delay some more.
*/
... | 293,122,411,844,764,000,000,000,000,000,000,000,000 | event.c | 304,094,101,609,928,860,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2010-3697 | The wait_for_child_to_die function in main/event.c in FreeRADIUS 2.1.x before 2.1.10, in certain circumstances involving long-term database outages, does not properly handle long queue times for requests, which allows remote attackers to cause a denial of service (daemon crash) by sending many requests. | https://nvd.nist.gov/vuln/detail/CVE-2010-3697 |
197,403 | fizz | 40bbb161e72fb609608d53b9d64c56bb961a6ee2 | https://github.com/facebookincubator/fizz | https://github.com/facebookincubator/fizz/commit/40bbb161e72fb609608d53b9d64c56bb961a6ee2 | Avoid arithmetic operation on uint16 read from the wire.
Summary:
This could overflow previously.
CVE-2019-3560
Reviewed By: yfeldblum
Differential Revision: D14152362
fbshipit-source-id: c0ebb3fc59b49c7c23e6bcb90458c19cd891be65 | 1 | folly::Optional<TLSMessage> PlaintextReadRecordLayer::read(
folly::IOBufQueue& buf) {
while (true) {
folly::io::Cursor cursor(buf.front());
if (buf.empty() || !cursor.canAdvance(kPlaintextHeaderSize)) {
return folly::none;
}
TLSMessage msg;
msg.type = static_cast<ContentType>(cursor.re... | 212,735,098,031,051,000,000,000,000,000,000,000,000 | PlaintextRecordLayer.cpp | 261,141,211,815,268,300,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-3560 | An improperly performed length calculation on a buffer in PlaintextRecordLayer could lead to an infinite loop and denial-of-service based on user input. This issue affected versions of fizz prior to v2019.03.04.00. | https://nvd.nist.gov/vuln/detail/CVE-2019-3560 |
258,229 | fizz | 40bbb161e72fb609608d53b9d64c56bb961a6ee2 | https://github.com/facebookincubator/fizz | https://github.com/facebookincubator/fizz/commit/40bbb161e72fb609608d53b9d64c56bb961a6ee2 | Avoid arithmetic operation on uint16 read from the wire.
Summary:
This could overflow previously.
CVE-2019-3560
Reviewed By: yfeldblum
Differential Revision: D14152362
fbshipit-source-id: c0ebb3fc59b49c7c23e6bcb90458c19cd891be65 | 0 | folly::Optional<TLSMessage> PlaintextReadRecordLayer::read(
folly::IOBufQueue& buf) {
while (true) {
folly::io::Cursor cursor(buf.front());
if (buf.empty() || !cursor.canAdvance(kPlaintextHeaderSize)) {
return folly::none;
}
TLSMessage msg;
msg.type = static_cast<ContentType>(cursor.re... | 339,355,273,169,192,300,000,000,000,000,000,000,000 | PlaintextRecordLayer.cpp | 208,759,293,813,328,400,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-3560 | An improperly performed length calculation on a buffer in PlaintextRecordLayer could lead to an infinite loop and denial-of-service based on user input. This issue affected versions of fizz prior to v2019.03.04.00. | https://nvd.nist.gov/vuln/detail/CVE-2019-3560 |
197,409 | radare2 | ced0223c7a1b3b5344af315715cd28fe7c0d9ebc | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/ced0223c7a1b3b5344af315715cd28fe7c0d9ebc | Fix unmatched array length in core_java.c (issue #16304) (#16313) | 1 | static int r_cmd_java_call(void *user, const char *input) {
RCore *core = (RCore *) user;
int res = false;
ut32 i = 0;
if (strncmp (input, "java", 4)) {
return false;
}
if (input[4] != ' ') {
return r_cmd_java_handle_help (core, input);
}
for (; i < END_CMDS; i++) {
//IFDBG r_cons_printf ("Checking cmd: %... | 302,967,166,898,851,150,000,000,000,000,000,000,000 | core_java.c | 151,901,301,081,024,260,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-27793 | An off-by-one overflow flaw was found in radare2 due to mismatched array length in core_java.c. This could allow an attacker to cause a crash, and perform a denail of service attack. | https://nvd.nist.gov/vuln/detail/CVE-2020-27793 |
258,312 | radare2 | ced0223c7a1b3b5344af315715cd28fe7c0d9ebc | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/ced0223c7a1b3b5344af315715cd28fe7c0d9ebc | Fix unmatched array length in core_java.c (issue #16304) (#16313) | 0 | static int r_cmd_java_call(void *user, const char *input) {
RCore *core = (RCore *) user;
int res = false;
ut32 i = 0;
if (strncmp (input, "java", 4)) {
return false;
}
if (input[4] != ' ') {
return r_cmd_java_handle_help (core, input);
}
for (; i < END_CMDS - 1; i++) {
//IFDBG r_cons_printf ("Checking cm... | 256,382,073,760,264,670,000,000,000,000,000,000,000 | core_java.c | 262,986,827,235,763,250,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-27793 | An off-by-one overflow flaw was found in radare2 due to mismatched array length in core_java.c. This could allow an attacker to cause a crash, and perform a denail of service attack. | https://nvd.nist.gov/vuln/detail/CVE-2020-27793 |
197,418 | tensorflow | 49847ae69a4e1a97ae7f2db5e217c77721e37948 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/49847ae69a4e1a97ae7f2db5e217c77721e37948 | Fix division by zero in TFLite padding.
PiperOrigin-RevId: 370777494
Change-Id: Ic1331e4a1603b9e4c8aa183012a6c8237410aa0f | 1 | inline int ComputeOutSize(TfLitePadding padding, int image_size,
int filter_size, int stride, int dilation_rate = 1) {
int effective_filter_size = (filter_size - 1) * dilation_rate + 1;
switch (padding) {
case kTfLitePaddingSame:
return (image_size + stride - 1) / stride;
cas... | 339,094,765,917,887,500,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2021-29585 | TensorFlow is an end-to-end open source platform for machine learning. The TFLite computation for size of output after padding, `ComputeOutSize`(https://github.com/tensorflow/tensorflow/blob/0c9692ae7b1671c983569e5d3de5565843d500cf/tensorflow/lite/kernels/padding.h#L43-L55), does not check that the `stride` argument is... | https://nvd.nist.gov/vuln/detail/CVE-2021-29585 |
258,463 | tensorflow | 49847ae69a4e1a97ae7f2db5e217c77721e37948 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/49847ae69a4e1a97ae7f2db5e217c77721e37948 | Fix division by zero in TFLite padding.
PiperOrigin-RevId: 370777494
Change-Id: Ic1331e4a1603b9e4c8aa183012a6c8237410aa0f | 0 | inline int ComputeOutSize(TfLitePadding padding, int image_size,
int filter_size, int stride, int dilation_rate = 1) {
int effective_filter_size = (filter_size - 1) * dilation_rate + 1;
// TODO(b/186448822): This uses 0 since the function has no other way to
// report error case
if (s... | 44,559,053,459,286,960,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2021-29585 | TensorFlow is an end-to-end open source platform for machine learning. The TFLite computation for size of output after padding, `ComputeOutSize`(https://github.com/tensorflow/tensorflow/blob/0c9692ae7b1671c983569e5d3de5565843d500cf/tensorflow/lite/kernels/padding.h#L43-L55), does not check that the `stride` argument is... | https://nvd.nist.gov/vuln/detail/CVE-2021-29585 |
197,420 | pure-ftpd | bf6fcd4935e95128cf22af5924cdc8fe5c0579da | https://github.com/jedisct1/pure-ftpd | https://github.com/jedisct1/pure-ftpd/commit/bf6fcd4935e95128cf22af5924cdc8fe5c0579da | pure_strcmp(): len(s2) can be > len(s1)
Reported by Antonio Morales from GitHub Security Labs, thanks! | 1 | int pure_strcmp(const char * const s1, const char * const s2)
{
return pure_memcmp(s1, s2, strlen(s1) + 1U);
} | 121,309,845,584,586,850,000,000,000,000,000,000,000 | utils.c | 196,840,832,067,198,840,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-9365 | An issue was discovered in Pure-FTPd 1.0.49. An out-of-bounds (OOB) read has been detected in the pure_strcmp function in utils.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-9365 |
258,471 | pure-ftpd | bf6fcd4935e95128cf22af5924cdc8fe5c0579da | https://github.com/jedisct1/pure-ftpd | https://github.com/jedisct1/pure-ftpd/commit/bf6fcd4935e95128cf22af5924cdc8fe5c0579da | pure_strcmp(): len(s2) can be > len(s1)
Reported by Antonio Morales from GitHub Security Labs, thanks! | 0 | int pure_strcmp(const char * const s1, const char * const s2)
{
const size_t s1_len = strlen(s1);
const size_t s2_len = strlen(s2);
const size_t len = (s1_len < s2_len) ? s1_len : s2_len;
return pure_memcmp(s1, s2, len + 1);
} | 307,325,257,865,580,570,000,000,000,000,000,000,000 | utils.c | 172,547,359,997,445,040,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-9365 | An issue was discovered in Pure-FTPd 1.0.49. An out-of-bounds (OOB) read has been detected in the pure_strcmp function in utils.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-9365 |
197,454 | Bento4 | 53499d8d4c69142137c7c7f0097a444783fdeb90 | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/53499d8d4c69142137c7c7f0097a444783fdeb90 | fix for #188 | 1 | AP4_HvccAtom::AP4_HvccAtom(AP4_UI32 size, const AP4_UI08* payload) :
AP4_Atom(AP4_ATOM_TYPE_HVCC, size)
{
// make a copy of our configuration bytes
unsigned int payload_size = size-AP4_ATOM_HEADER_SIZE;
m_RawBytes.SetData(payload, payload_size);
// parse the payload
m_ConfigurationVersion = p... | 331,335,061,636,227,600,000,000,000,000,000,000,000 | Ap4HvccAtom.cpp | 284,120,992,807,607,550,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-14646 | The AP4_AvccAtom and AP4_HvccAtom classes in Bento4 version 1.5.0-617 do not properly validate data sizes, leading to a heap-based buffer over-read and application crash in AP4_DataBuffer::SetData in Core/Ap4DataBuffer.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2017-14646 |
258,984 | Bento4 | 53499d8d4c69142137c7c7f0097a444783fdeb90 | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/53499d8d4c69142137c7c7f0097a444783fdeb90 | fix for #188 | 0 | AP4_HvccAtom::AP4_HvccAtom(AP4_UI32 size, const AP4_UI08* payload) :
AP4_Atom(AP4_ATOM_TYPE_HVCC, size)
{
// make a copy of our configuration bytes
unsigned int payload_size = size-AP4_ATOM_HEADER_SIZE;
// keep a raw copy
if (payload_size < 22) return;
m_RawBytes.SetData(payload, payload_size);... | 335,912,317,467,293,300,000,000,000,000,000,000,000 | Ap4HvccAtom.cpp | 91,545,346,318,859,280,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-14646 | The AP4_AvccAtom and AP4_HvccAtom classes in Bento4 version 1.5.0-617 do not properly validate data sizes, leading to a heap-based buffer over-read and application crash in AP4_DataBuffer::SetData in Core/Ap4DataBuffer.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2017-14646 |
197,455 | Bento4 | 53499d8d4c69142137c7c7f0097a444783fdeb90 | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/53499d8d4c69142137c7c7f0097a444783fdeb90 | fix for #188 | 1 | AP4_AvccAtom::AP4_AvccAtom(AP4_UI32 size, const AP4_UI08* payload) :
AP4_Atom(AP4_ATOM_TYPE_AVCC, size)
{
// make a copy of our configuration bytes
unsigned int payload_size = size-AP4_ATOM_HEADER_SIZE;
m_RawBytes.SetData(payload, payload_size);
// parse the payload
m_ConfigurationVersion = pay... | 111,492,234,491,944,000,000,000,000,000,000,000,000 | Ap4AvccAtom.cpp | 160,048,528,581,776,210,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-14646 | The AP4_AvccAtom and AP4_HvccAtom classes in Bento4 version 1.5.0-617 do not properly validate data sizes, leading to a heap-based buffer over-read and application crash in AP4_DataBuffer::SetData in Core/Ap4DataBuffer.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2017-14646 |
258,981 | Bento4 | 53499d8d4c69142137c7c7f0097a444783fdeb90 | https://github.com/axiomatic-systems/Bento4 | https://github.com/axiomatic-systems/Bento4/commit/53499d8d4c69142137c7c7f0097a444783fdeb90 | fix for #188 | 0 | AP4_AvccAtom::AP4_AvccAtom(AP4_UI32 size, const AP4_UI08* payload) :
AP4_Atom(AP4_ATOM_TYPE_AVCC, size)
{
// make a copy of our configuration bytes
unsigned int payload_size = size-AP4_ATOM_HEADER_SIZE;
m_RawBytes.SetData(payload, payload_size);
// parse the payload
m_ConfigurationVersion = pay... | 184,479,736,074,423,570,000,000,000,000,000,000,000 | Ap4AvccAtom.cpp | 26,725,286,725,359,955,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-14646 | The AP4_AvccAtom and AP4_HvccAtom classes in Bento4 version 1.5.0-617 do not properly validate data sizes, leading to a heap-based buffer over-read and application crash in AP4_DataBuffer::SetData in Core/Ap4DataBuffer.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2017-14646 |
197,456 | tensorflow | 8a6e874437670045e6c7dc6154c7412b4a2135e2 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2 | Validate num_elements input in tf.raw_ops.TensorListReserve
PiperOrigin-RevId: 383954564
Change-Id: I454bd78eff85bc4f16ddb7e608596971cca47f8f | 1 | void Compute(OpKernelContext* c) override {
PartialTensorShape element_shape;
OP_REQUIRES_OK(c, TensorShapeFromTensor(c->input(0), &element_shape));
int32 num_elements = c->input(1).scalar<int32>()();
TensorList output;
output.element_shape = element_shape;
output.element_dtype = element_dtype... | 243,117,580,726,943,050,000,000,000,000,000,000,000 | list_kernels.cc | 210,360,149,145,833,570,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-37644 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions providing a negative element to `num_elements` list argument of `tf.raw_ops.TensorListReserve` causes the runtime to abort the process due to reallocating a `std::vector` to have a negative number of elements. The [implementatio... | https://nvd.nist.gov/vuln/detail/CVE-2021-37644 |
258,998 | tensorflow | 8a6e874437670045e6c7dc6154c7412b4a2135e2 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2 | Validate num_elements input in tf.raw_ops.TensorListReserve
PiperOrigin-RevId: 383954564
Change-Id: I454bd78eff85bc4f16ddb7e608596971cca47f8f | 0 | void Compute(OpKernelContext* c) override {
PartialTensorShape element_shape;
OP_REQUIRES_OK(c, TensorShapeFromTensor(c->input(0), &element_shape));
int32 num_elements = c->input(1).scalar<int32>()();
OP_REQUIRES(c, num_elements >= 0,
errors::InvalidArgument("The num_elements to reserv... | 277,791,309,071,220,030,000,000,000,000,000,000,000 | list_kernels.cc | 277,022,414,194,505,200,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-37644 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions providing a negative element to `num_elements` list argument of `tf.raw_ops.TensorListReserve` causes the runtime to abort the process due to reallocating a `std::vector` to have a negative number of elements. The [implementatio... | https://nvd.nist.gov/vuln/detail/CVE-2021-37644 |
197,463 | tensorflow | a7116dd3913c4a4afd2a3a938573aa7c785fdfc6 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a7116dd3913c4a4afd2a3a938573aa7c785fdfc6 | Validate `MatrixDiagV{2,3}` arguments to prevent breakage.
PiperOrigin-RevId: 369056033
Change-Id: Ic2018c297d3dd6f252dc1dd3667f1ed5cb1eaa42 | 1 | void Compute(OpKernelContext* context) override {
const Tensor& diagonal = context->input(0);
// MatrixDiag and MatrixDiagV2 both use this OpKernel. MatrixDiag only has
// one input, so we have to check the number of inputs before reading
// additional parameters in MatrixDiagV2.
int32 lower_diag... | 168,901,046,729,603,980,000,000,000,000,000,000,000 | matrix_diag_op.cc | 334,644,474,900,792,060,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2021-29515 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `MatrixDiag*` operations(https://github.com/tensorflow/tensorflow/blob/4c4f420e68f1cfaf8f4b6e8e3eb857e9e4c3ff33/tensorflow/core/kernels/linalg/matrix_diag_op.cc#L195-L197) does not validate that the tensor arguments are non-emp... | https://nvd.nist.gov/vuln/detail/CVE-2021-29515 |
259,054 | tensorflow | a7116dd3913c4a4afd2a3a938573aa7c785fdfc6 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a7116dd3913c4a4afd2a3a938573aa7c785fdfc6 | Validate `MatrixDiagV{2,3}` arguments to prevent breakage.
PiperOrigin-RevId: 369056033
Change-Id: Ic2018c297d3dd6f252dc1dd3667f1ed5cb1eaa42 | 0 | void Compute(OpKernelContext* context) override {
const Tensor& diagonal = context->input(0);
// MatrixDiag and MatrixDiagV2 both use this OpKernel. MatrixDiag only has
// one input, so we have to check the number of inputs before reading
// additional parameters in MatrixDiagV2.
int32 lower_diag... | 59,169,174,181,965,490,000,000,000,000,000,000,000 | matrix_diag_op.cc | 163,161,773,486,725,490,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2021-29515 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of `MatrixDiag*` operations(https://github.com/tensorflow/tensorflow/blob/4c4f420e68f1cfaf8f4b6e8e3eb857e9e4c3ff33/tensorflow/core/kernels/linalg/matrix_diag_op.cc#L195-L197) does not validate that the tensor arguments are non-emp... | https://nvd.nist.gov/vuln/detail/CVE-2021-29515 |
197,474 | libsixel | cb373ab6614c910407c5e5a93ab935144e62b037 | https://github.com/saitoha/libsixel | https://github.com/saitoha/libsixel/commit/cb373ab6614c910407c5e5a93ab935144e62b037 | Avoid illegal memory access problem with 1 color paletted png(#73),
Thanks to HongxuChen. | 1 | sixel_dither_new(
sixel_dither_t /* out */ **ppdither, /* dither object to be created */
int /* in */ ncolors, /* required colors */
sixel_allocator_t /* in */ *allocator) /* allocator, null if you use
default allocator */
{
SIXELSTATU... | 170,667,451,677,567,100,000,000,000,000,000,000,000 | dither.c | 174,004,426,209,367,550,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2020-21048 | An issue in the dither.c component of libsixel prior to v1.8.4 allows attackers to cause a denial of service (DOS) via a crafted PNG file. | https://nvd.nist.gov/vuln/detail/CVE-2020-21048 |
259,340 | libsixel | cb373ab6614c910407c5e5a93ab935144e62b037 | https://github.com/saitoha/libsixel | https://github.com/saitoha/libsixel/commit/cb373ab6614c910407c5e5a93ab935144e62b037 | Avoid illegal memory access problem with 1 color paletted png(#73),
Thanks to HongxuChen. | 0 | sixel_dither_new(
sixel_dither_t /* out */ **ppdither, /* dither object to be created */
int /* in */ ncolors, /* required colors */
sixel_allocator_t /* in */ *allocator) /* allocator, null if you use
default allocator */
{
SIXELSTATU... | 132,439,007,361,157,970,000,000,000,000,000,000,000 | dither.c | 212,352,249,689,211,370,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2020-21048 | An issue in the dither.c component of libsixel prior to v1.8.4 allows attackers to cause a denial of service (DOS) via a crafted PNG file. | https://nvd.nist.gov/vuln/detail/CVE-2020-21048 |
197,479 | gpac | 51cdb67ff7c5f1242ac58c5aa603ceaf1793b788 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788 | add safety in avc/hevc/vvc sps/pps/vps ID check - cf #1720 #1721 #1722 | 1 | static s32 gf_hevc_read_pps_bs_internal(GF_BitStream *bs, HEVCState *hevc)
{
u32 i;
s32 pps_id;
HEVC_PPS *pps;
//NAL header already read
pps_id = gf_bs_read_ue_log(bs, "pps_id");
if ((pps_id < 0) || (pps_id >= 64)) {
GF_LOG(GF_LOG_ERROR, GF_LOG_CODING, ("[HEVC] wrong PPS ID %d in PPS\n", pps_id));
return -1... | 297,325,802,053,896,670,000,000,000,000,000,000,000 | av_parsers.c | 289,283,171,604,366,800,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-30022 | There is a integer overflow in media_tools/av_parsers.c in the gf_avc_read_pps_bs_internal in GPAC 1.0.1. pps_id may be a negative number, so it will not return. However, avc->pps only has 255 unit, so there is an overflow, which results a crash. | https://nvd.nist.gov/vuln/detail/CVE-2021-30022 |
259,399 | gpac | 51cdb67ff7c5f1242ac58c5aa603ceaf1793b788 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788 | add safety in avc/hevc/vvc sps/pps/vps ID check - cf #1720 #1721 #1722 | 0 | static s32 gf_hevc_read_pps_bs_internal(GF_BitStream *bs, HEVCState *hevc)
{
u32 i;
s32 pps_id;
HEVC_PPS *pps;
//NAL header already read
pps_id = gf_bs_read_ue_log(bs, "pps_id");
if ((pps_id < 0) || (pps_id >= 64)) {
GF_LOG(GF_LOG_ERROR, GF_LOG_CODING, ("[HEVC] wrong PPS ID %d in PPS\n", pps_id));
return -1... | 228,395,575,536,952,500,000,000,000,000,000,000,000 | av_parsers.c | 168,517,587,328,341,010,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-30022 | There is a integer overflow in media_tools/av_parsers.c in the gf_avc_read_pps_bs_internal in GPAC 1.0.1. pps_id may be a negative number, so it will not return. However, avc->pps only has 255 unit, so there is an overflow, which results a crash. | https://nvd.nist.gov/vuln/detail/CVE-2021-30022 |
197,492 | neomutt | e27b65b3bf8defa34db58919496056caf3850cd4 | https://github.com/neomutt/neomutt | https://github.com/neomutt/neomutt/commit/e27b65b3bf8defa34db58919496056caf3850cd4 | imap_quote_string make room for quotes | 1 | void imap_quote_string(char *dest, size_t dlen, const char *src, bool quote_backtick)
{
const char *quote = "`\"\\";
if (!quote_backtick)
quote++;
char *pt = dest;
const char *s = src;
*pt++ = '"';
/* save room for trailing quote-char */
dlen -= 2;
for (; *s && dlen; s++)
{
if (strchr(quote... | 117,561,144,693,924,940,000,000,000,000,000,000,000 | util.c | 210,410,034,595,130,370,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-14352 | An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2018-14352 |
259,467 | neomutt | e27b65b3bf8defa34db58919496056caf3850cd4 | https://github.com/neomutt/neomutt | https://github.com/neomutt/neomutt/commit/e27b65b3bf8defa34db58919496056caf3850cd4 | imap_quote_string make room for quotes | 0 | void imap_quote_string(char *dest, size_t dlen, const char *src, bool quote_backtick)
{
const char *quote = "`\"\\";
if (!quote_backtick)
quote++;
char *pt = dest;
const char *s = src;
*pt++ = '"';
/* save room for quote-chars */
dlen -= 3;
for (; *s && dlen; s++)
{
if (strchr(quote, *s))
... | 191,207,938,573,933,800,000,000,000,000,000,000,000 | util.c | 201,682,181,966,853,900,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-14352 | An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2018-14352 |
197,502 | ImageMagick | 66e283e0a9c141b19fe6c4c39f4a41c0d3188ba8 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/66e283e0a9c141b19fe6c4c39f4a41c0d3188ba8 | ... | 1 | static Image *ReadMPCImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
cache_filename[MagickPathExtent],
id[MagickPathExtent],
keyword[MagickPathExtent],
*options;
const unsigned char
*p;
GeometryInfo
geometry_info;
Image
*image;
int
c;
LinkedListInfo
... | 171,059,761,845,814,600,000,000,000,000,000,000,000 | mpc.c | 122,879,770,695,522,510,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2017-5507 | Memory leak in coders/mpc.c in ImageMagick before 6.9.7-4 and 7.x before 7.0.4-4 allows remote attackers to cause a denial of service (memory consumption) via vectors involving a pixel cache. | https://nvd.nist.gov/vuln/detail/CVE-2017-5507 |
259,521 | ImageMagick | 66e283e0a9c141b19fe6c4c39f4a41c0d3188ba8 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/66e283e0a9c141b19fe6c4c39f4a41c0d3188ba8 | ... | 0 | static Image *ReadMPCImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
cache_filename[MagickPathExtent],
id[MagickPathExtent],
keyword[MagickPathExtent],
*options;
const unsigned char
*p;
GeometryInfo
geometry_info;
Image
*image;
int
c;
LinkedListInfo
... | 173,837,340,975,945,260,000,000,000,000,000,000,000 | mpc.c | 129,988,513,172,456,500,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2017-5507 | Memory leak in coders/mpc.c in ImageMagick before 6.9.7-4 and 7.x before 7.0.4-4 allows remote attackers to cause a denial of service (memory consumption) via vectors involving a pixel cache. | https://nvd.nist.gov/vuln/detail/CVE-2017-5507 |
197,508 | linux | bc0b96b54a21246e377122d54569eef71cec535f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc0b96b54a21246e377122d54569eef71cec535f | crypto: Move md5_transform to lib/md5.c
We are going to use this for TCP/IP sequence number and fragment ID
generation.
Signed-off-by: David S. Miller <davem@davemloft.net> | 1 | static void md5_transform(u32 *hash, u32 const *in)
{
u32 a, b, c, d;
a = hash[0];
b = hash[1];
c = hash[2];
d = hash[3];
MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7);
MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12);
MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17);
MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdcee... | 13,796,085,130,929,380,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2011-3188 | The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and ... | https://nvd.nist.gov/vuln/detail/CVE-2011-3188 |
259,588 | linux | bc0b96b54a21246e377122d54569eef71cec535f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bc0b96b54a21246e377122d54569eef71cec535f | crypto: Move md5_transform to lib/md5.c
We are going to use this for TCP/IP sequence number and fragment ID
generation.
Signed-off-by: David S. Miller <davem@davemloft.net> | 0 | void md5_transform(__u32 *hash, __u32 const *in)
{
u32 a, b, c, d;
a = hash[0];
b = hash[1];
c = hash[2];
d = hash[3];
MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7);
MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12);
MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17);
MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, ... | 67,694,714,863,169,235,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2011-3188 | The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and ... | https://nvd.nist.gov/vuln/detail/CVE-2011-3188 |
197,523 | muon | c18663aa171c6cdf03da3e8c70df8663645b97c4 | https://github.com/brave/muon | https://github.com/brave/muon/commit/c18663aa171c6cdf03da3e8c70df8663645b97c4 | Issue: 15232 AllowScript should use atom::ContentSettingsManager like other Allow* methods in the observer | 1 | bool ContentSettingsObserver::AllowScript(bool enabled_per_settings) {
if (!enabled_per_settings)
return false;
if (IsScriptDisabledForPreview(render_frame()))
return false;
if (is_interstitial_page_)
return true;
blink::WebLocalFrame* frame = render_frame()->GetWebFrame();
const auto it = cached... | 237,083,620,463,072,280,000,000,000,000,000,000,000 | content_settings_observer.cc | 192,287,553,509,190,270,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1000815 | Brave Software Inc. Brave version version 0.22.810 to 0.24.0 contains a Other/Unknown vulnerability in function ContentSettingsObserver::AllowScript() in content_settings_observer.cc that can result in Websites can run inline JavaScript even if script is blocked, making attackers easier to track users. This attack appe... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000815 |
259,855 | muon | c18663aa171c6cdf03da3e8c70df8663645b97c4 | https://github.com/brave/muon | https://github.com/brave/muon/commit/c18663aa171c6cdf03da3e8c70df8663645b97c4 | Issue: 15232 AllowScript should use atom::ContentSettingsManager like other Allow* methods in the observer | 0 | bool ContentSettingsObserver::AllowScript(bool enabled_per_settings) {
if (!enabled_per_settings)
return false;
if (IsScriptDisabledForPreview(render_frame()))
return false;
if (is_interstitial_page_)
return true;
blink::WebLocalFrame* frame = render_frame()->GetWebFrame();
const auto it = cached... | 208,473,208,544,848,660,000,000,000,000,000,000,000 | content_settings_observer.cc | 181,684,349,958,332,650,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-1000815 | Brave Software Inc. Brave version version 0.22.810 to 0.24.0 contains a Other/Unknown vulnerability in function ContentSettingsObserver::AllowScript() in content_settings_observer.cc that can result in Websites can run inline JavaScript even if script is blocked, making attackers easier to track users. This attack appe... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000815 |
197,539 | vlc | 204291467724867b79735c0ee3aeb0dbc2200f97 | https://github.com/videolan/vlc | https://github.com/videolan/vlc/commit/204291467724867b79735c0ee3aeb0dbc2200f97 | stream_out: rtp: don't use VLA for user controlled data
It should fix a possible invalid memory access
When streaming ogg-files via rtp, an ogg-file can trigger an invalid
write access using an overly long 'configuration' string.
The original code attemps to allocate space to hold the string on the stack
and hence, ... | 1 | int rtp_packetize_xiph_config( sout_stream_id_sys_t *id, const char *fmtp,
int64_t i_pts )
{
if (fmtp == NULL)
return VLC_EGENERIC;
/* extract base64 configuration from fmtp */
char *start = strstr(fmtp, "configuration=");
assert(start != NULL);
start += sizeo... | 61,906,958,544,646,655,000,000,000,000,000,000,000 | rtpfmt.c | 67,128,685,027,688,970,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2014-9630 | The rtp_packetize_xiph_config function in modules/stream_out/rtpfmt.c in VideoLAN VLC media player before 2.1.6 uses a stack-allocation approach with a size determined by arbitrary input data, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a ... | https://nvd.nist.gov/vuln/detail/CVE-2014-9630 |
260,560 | vlc | 204291467724867b79735c0ee3aeb0dbc2200f97 | https://github.com/videolan/vlc | https://github.com/videolan/vlc/commit/204291467724867b79735c0ee3aeb0dbc2200f97 | stream_out: rtp: don't use VLA for user controlled data
It should fix a possible invalid memory access
When streaming ogg-files via rtp, an ogg-file can trigger an invalid
write access using an overly long 'configuration' string.
The original code attemps to allocate space to hold the string on the stack
and hence, ... | 0 | int rtp_packetize_xiph_config( sout_stream_id_sys_t *id, const char *fmtp,
int64_t i_pts )
{
if (fmtp == NULL)
return VLC_EGENERIC;
/* extract base64 configuration from fmtp */
char *start = strstr(fmtp, "configuration=");
assert(start != NULL);
start += sizeo... | 180,761,742,555,289,960,000,000,000,000,000,000,000 | rtpfmt.c | 139,902,113,430,501,560,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2014-9630 | The rtp_packetize_xiph_config function in modules/stream_out/rtpfmt.c in VideoLAN VLC media player before 2.1.6 uses a stack-allocation approach with a size determined by arbitrary input data, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a ... | https://nvd.nist.gov/vuln/detail/CVE-2014-9630 |
197,544 | vlc | 9bb0353a5c63a7f8c6fc853faa3df4b4df1f5eb5 | https://github.com/videolan/vlc | https://github.com/videolan/vlc/commit/9bb0353a5c63a7f8c6fc853faa3df4b4df1f5eb5 | codec: schroedinger: fix potential buffer overflow.
The variable len is a raw 32 bit value read using GetDWBE. If this
value is larger than UINT32_MAX - sizeof(eos), this will cause an
integer overflow in the subsequent call to malloc, and finally a
buffer overflow when calling memcpy. We fix this by checking len
acco... | 1 | static block_t *Encode( encoder_t *p_enc, picture_t *p_pic )
{
encoder_sys_t *p_sys = p_enc->p_sys;
block_t *p_block, *p_output_chain = NULL;
SchroFrame *p_frame;
bool b_go = true;
if( !p_pic ) {
if( !p_sys->started || p_sys->b_eos_pulled )
return NULL;
if( !p_sys->b_eo... | 297,922,051,709,535,180,000,000,000,000,000,000,000 | schroedinger.c | 163,287,996,990,636,630,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2014-9629 | Integer overflow in the Encode function in modules/codec/schroedinger.c in VideoLAN VLC media player before 2.1.6 and 2.2.x before 2.2.1 allows remote attackers to conduct buffer overflow attacks and execute arbitrary code via a crafted length value. | https://nvd.nist.gov/vuln/detail/CVE-2014-9629 |
260,645 | vlc | 9bb0353a5c63a7f8c6fc853faa3df4b4df1f5eb5 | https://github.com/videolan/vlc | https://github.com/videolan/vlc/commit/9bb0353a5c63a7f8c6fc853faa3df4b4df1f5eb5 | codec: schroedinger: fix potential buffer overflow.
The variable len is a raw 32 bit value read using GetDWBE. If this
value is larger than UINT32_MAX - sizeof(eos), this will cause an
integer overflow in the subsequent call to malloc, and finally a
buffer overflow when calling memcpy. We fix this by checking len
acco... | 0 | static block_t *Encode( encoder_t *p_enc, picture_t *p_pic )
{
encoder_sys_t *p_sys = p_enc->p_sys;
block_t *p_block, *p_output_chain = NULL;
SchroFrame *p_frame;
bool b_go = true;
if( !p_pic ) {
if( !p_sys->started || p_sys->b_eos_pulled )
return NULL;
if( !p_sys->b_eo... | 184,003,617,845,941,640,000,000,000,000,000,000,000 | schroedinger.c | 111,512,992,297,961,510,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2014-9629 | Integer overflow in the Encode function in modules/codec/schroedinger.c in VideoLAN VLC media player before 2.1.6 and 2.2.x before 2.2.1 allows remote attackers to conduct buffer overflow attacks and execute arbitrary code via a crafted length value. | https://nvd.nist.gov/vuln/detail/CVE-2014-9629 |
197,573 | gpac | 22774aa9e62f586319c8f107f5bae950fed900bc | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/22774aa9e62f586319c8f107f5bae950fed900bc | fixed potential crash in adts reframer with broken streams - cf #1723 | 1 | GF_Err adts_dmx_process(GF_Filter *filter)
{
GF_ADTSDmxCtx *ctx = gf_filter_get_udta(filter);
GF_FilterPacket *pck, *dst_pck;
u8 *data, *output;
u8 *start;
u32 pck_size, remain, prev_pck_size;
u64 cts = GF_FILTER_NO_TS;
//always reparse duration
if (!ctx->duration.num)
adts_dmx_check_dur(filter, ctx);
if (... | 245,157,112,169,555,560,000,000,000,000,000,000,000 | reframe_adts.c | 13,070,856,985,201,005,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-30019 | In the adts_dmx_process function in filters/reframe_adts.c in GPAC 1.0.1, a crafted file may cause ctx->hdr.frame_size to be smaller than ctx->hdr.hdr_size, resulting in size to be a negative number and a heap overflow in the memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2021-30019 |
261,376 | gpac | 22774aa9e62f586319c8f107f5bae950fed900bc | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/22774aa9e62f586319c8f107f5bae950fed900bc | fixed potential crash in adts reframer with broken streams - cf #1723 | 0 | GF_Err adts_dmx_process(GF_Filter *filter)
{
GF_ADTSDmxCtx *ctx = gf_filter_get_udta(filter);
GF_FilterPacket *pck, *dst_pck;
u8 *data, *output;
u8 *start;
u32 pck_size, remain, prev_pck_size;
u64 cts = GF_FILTER_NO_TS;
//always reparse duration
if (!ctx->duration.num)
adts_dmx_check_dur(filter, ctx);
if (... | 26,709,526,143,636,800,000,000,000,000,000,000,000 | reframe_adts.c | 318,962,490,957,036,760,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-30019 | In the adts_dmx_process function in filters/reframe_adts.c in GPAC 1.0.1, a crafted file may cause ctx->hdr.frame_size to be smaller than ctx->hdr.hdr_size, resulting in size to be a negative number and a heap overflow in the memcpy. | https://nvd.nist.gov/vuln/detail/CVE-2021-30019 |
197,576 | libass | f4f48950788b91c6a30029cc28a240b834713ea7 | https://github.com/libass/libass | https://github.com/libass/libass/commit/f4f48950788b91c6a30029cc28a240b834713ea7 | Fix line wrapping mode 0/3 bugs
This fixes two separate bugs:
a) Don't move a linebreak into the first symbol. This results in a empty
line at the front, which does not help to equalize line lengths at all.
Instead, merge line with the second one.
b) When moving a linebreak into a symbol that already is a break... | 1 | wrap_lines_smart(ASS_Renderer *render_priv, double max_text_width)
{
int i;
GlyphInfo *cur, *s1, *e1, *s2, *s3;
int last_space;
int break_type;
int exit;
double pen_shift_x;
double pen_shift_y;
int cur_line;
int run_offset;
TextInfo *text_info = &render_priv->text_info;
last... | 265,640,312,431,762,900,000,000,000,000,000,000,000 | ass_render.c | 256,046,161,915,596,200,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7969 | The wrap_lines_smart function in ass_render.c in libass before 0.13.4 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, related to "0/3 line wrapping equalization." | https://nvd.nist.gov/vuln/detail/CVE-2016-7969 |
261,473 | libass | f4f48950788b91c6a30029cc28a240b834713ea7 | https://github.com/libass/libass | https://github.com/libass/libass/commit/f4f48950788b91c6a30029cc28a240b834713ea7 | Fix line wrapping mode 0/3 bugs
This fixes two separate bugs:
a) Don't move a linebreak into the first symbol. This results in a empty
line at the front, which does not help to equalize line lengths at all.
Instead, merge line with the second one.
b) When moving a linebreak into a symbol that already is a break... | 0 | wrap_lines_smart(ASS_Renderer *render_priv, double max_text_width)
{
int i;
GlyphInfo *cur, *s1, *e1, *s2, *s3;
int last_space;
int break_type;
int exit;
double pen_shift_x;
double pen_shift_y;
int cur_line;
int run_offset;
TextInfo *text_info = &render_priv->text_info;
last... | 8,534,752,724,889,373,000,000,000,000,000,000,000 | ass_render.c | 93,890,585,765,450,650,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7969 | The wrap_lines_smart function in ass_render.c in libass before 0.13.4 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, related to "0/3 line wrapping equalization." | https://nvd.nist.gov/vuln/detail/CVE-2016-7969 |
197,590 | tensorflow | f2c3931113eaafe9ef558faaddd48e00a6606235 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235 | Adding more validation checks to _ParallelConcatUpdate to avoid NPE.
PiperOrigin-RevId: 402569467
Change-Id: I2db122dab68be2a5e4e8dd3375f5a70c4d2307ec | 1 | void Compute(OpKernelContext* ctx) override {
auto value = ctx->input(0);
auto update = ctx->input(1);
OP_REQUIRES(
ctx, value.dims() == update.dims(),
errors::InvalidArgument("value and update shape doesn't match: ",
value.shape().DebugString(), " vs. ",
... | 98,630,561,184,832,400,000,000,000,000,000,000,000 | inplace_ops.cc | 1,467,489,029,762,972,500,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-41207 | TensorFlow is an open source platform for machine learning. In affected versions the implementation of `ParallelConcat` misses some input validation and can produce a division by 0. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.... | https://nvd.nist.gov/vuln/detail/CVE-2021-41207 |
261,574 | tensorflow | f2c3931113eaafe9ef558faaddd48e00a6606235 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235 | Adding more validation checks to _ParallelConcatUpdate to avoid NPE.
PiperOrigin-RevId: 402569467
Change-Id: I2db122dab68be2a5e4e8dd3375f5a70c4d2307ec | 0 | void Compute(OpKernelContext* ctx) override {
auto value = ctx->input(0);
// Value should be at least rank 1. Also the 0th dimension should be
// at least loc_.
OP_REQUIRES(ctx, value.dims() >= 1,
errors::InvalidArgument("value should be at least rank 1."));
OP_REQUIRES(
ct... | 196,686,018,469,676,160,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2021-41207 | TensorFlow is an open source platform for machine learning. In affected versions the implementation of `ParallelConcat` misses some input validation and can produce a division by 0. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.... | https://nvd.nist.gov/vuln/detail/CVE-2021-41207 |
197,591 | gpac | faa75edde3dfeba1e2cf6ffa48e45a50f1042096 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/faa75edde3dfeba1e2cf6ffa48e45a50f1042096 | fixed #2213 | 1 | static Fixed lsr_translate_coords(GF_LASeRCodec *lsr, u32 val, u32 nb_bits)
{
#ifdef GPAC_FIXED_POINT
if (val >> (nb_bits-1) ) {
s32 neg = (s32) val - (1<<nb_bits);
if (neg < -FIX_ONE / 2)
return 2 * gf_divfix(INT2FIX(neg/2), lsr->res_factor);
return gf_divfix(INT2FIX(neg), lsr->res_factor);
} else {
if (v... | 83,111,933,375,980,730,000,000,000,000,000,000,000 | lsr_dec.c | 126,283,251,536,549,830,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2022-2454 | Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.1-DEV. | https://nvd.nist.gov/vuln/detail/CVE-2022-2454 |
261,665 | gpac | faa75edde3dfeba1e2cf6ffa48e45a50f1042096 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/faa75edde3dfeba1e2cf6ffa48e45a50f1042096 | fixed #2213 | 0 | static Fixed lsr_translate_coords(GF_LASeRCodec *lsr, u32 val, u32 nb_bits)
{
if (!nb_bits) return 0;
#ifdef GPAC_FIXED_POINT
if (val >> (nb_bits-1) ) {
s32 neg = (s32) val - (1<<nb_bits);
if (neg < -FIX_ONE / 2)
return 2 * gf_divfix(INT2FIX(neg/2), lsr->res_factor);
return gf_divfix(INT2FIX(neg), lsr->res... | 268,943,379,245,099,700,000,000,000,000,000,000,000 | lsr_dec.c | 174,794,081,698,567,240,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2022-2454 | Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.1-DEV. | https://nvd.nist.gov/vuln/detail/CVE-2022-2454 |
197,650 | tensorflow | ff8894044dfae5568ecbf2ed514c1a37dc394f1b | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b | Add one missing valdiation to `matrix_set_diag_op.cc`
PiperOrigin-RevId: 387923408
Change-Id: If6a97b9098c13879400f56c22f91555cdf0ce5d7 | 1 | void Compute(OpKernelContext* context) override {
const Tensor& input = context->input(0);
const Tensor& diag = context->input(1);
// MatrixSetDiag and MatrixSetDiagV2 both use this OpKernel. MatrixSetDiag
// only has two inputs, so we have to check the number of inputs before
// reading addition... | 334,978,766,458,952,920,000,000,000,000,000,000,000 | matrix_set_diag_op.cc | 255,652,985,875,337,400,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-37658 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in all operations of type `tf.raw_ops.MatrixSetDiagV*`. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b968... | https://nvd.nist.gov/vuln/detail/CVE-2021-37658 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.