idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
262,659
tensorflow
ff8894044dfae5568ecbf2ed514c1a37dc394f1b
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b
Add one missing valdiation to `matrix_set_diag_op.cc` PiperOrigin-RevId: 387923408 Change-Id: If6a97b9098c13879400f56c22f91555cdf0ce5d7
0
void Compute(OpKernelContext* context) override { const Tensor& input = context->input(0); const Tensor& diag = context->input(1); // MatrixSetDiag and MatrixSetDiagV2 both use this OpKernel. MatrixSetDiag // only has two inputs, so we have to check the number of inputs before // reading addition...
331,353,730,489,466,700,000,000,000,000,000,000,000
matrix_set_diag_op.cc
225,232,759,608,931,400,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-37658
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in all operations of type `tf.raw_ops.MatrixSetDiagV*`. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b968...
https://nvd.nist.gov/vuln/detail/CVE-2021-37658
197,651
tensorflow
2d88f470dea2671b430884260f3626b1fe99830a
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a
[tflite] Ensure `ResolveAxis` properly handles negative inputs. In Python, a list `l` of length `n` allows indexing with negative indices, `l[i]`. The only constraint is that `n + i` becomes positive. Code in `ResolveAxis` assumes the constraints and only checks it using a `DCHECK`. But the macro is a no-op in non-deb...
1
inline bool ResolveAxis(const int num_dims, const int* axis, const int64_t num_axis, int* out_axis, int* out_num_axis) { *out_num_axis = 0; // Just in case. // Short-circuit axis resolution for scalars; the axis will go unused. if (num_dims == 0) { return true;...
108,836,501,475,910,810,000,000,000,000,000,000,000
reduce.h
86,072,470,145,116,500,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-15207
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, to mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds. If the `DCHECK` does not tri...
https://nvd.nist.gov/vuln/detail/CVE-2020-15207
262,662
tensorflow
2d88f470dea2671b430884260f3626b1fe99830a
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a
[tflite] Ensure `ResolveAxis` properly handles negative inputs. In Python, a list `l` of length `n` allows indexing with negative indices, `l[i]`. The only constraint is that `n + i` becomes positive. Code in `ResolveAxis` assumes the constraints and only checks it using a `DCHECK`. But the macro is a no-op in non-deb...
0
inline bool ResolveAxis(const int num_dims, const int* axis, const int64_t num_axis, int* out_axis, int* out_num_axis) { *out_num_axis = 0; // Just in case. // Short-circuit axis resolution for scalars; the axis will go unused. if (num_dims == 0) { return true;...
274,659,630,210,965,100,000,000,000,000,000,000,000
reduce.h
311,723,333,358,509,900,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-15207
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, to mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds. If the `DCHECK` does not tri...
https://nvd.nist.gov/vuln/detail/CVE-2020-15207
197,717
linux
ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009
kvm: x86: fix kvm_apic_has_events to check for NULL pointer Malicious (or egregiously buggy) userspace can trigger it, but it should never happen in normal operation. Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
1
static inline bool kvm_apic_has_events(struct kvm_vcpu *vcpu) { return vcpu->arch.apic->pending_events; }
304,816,238,329,090,500,000,000,000,000,000,000,000
lapic.h
328,029,734,494,475,900,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2015-4692
The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the Linux kernel through 4.1.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging /dev/kvm access for an ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2015-4692
262,785
linux
ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009
kvm: x86: fix kvm_apic_has_events to check for NULL pointer Malicious (or egregiously buggy) userspace can trigger it, but it should never happen in normal operation. Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
0
static inline bool kvm_apic_has_events(struct kvm_vcpu *vcpu) { return kvm_vcpu_has_lapic(vcpu) && vcpu->arch.apic->pending_events; }
303,930,253,695,186,800,000,000,000,000,000,000,000
lapic.h
4,504,020,028,775,507,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2015-4692
The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the Linux kernel through 4.1.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging /dev/kvm access for an ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2015-4692
197,724
opencv
7bbe1a53cfc097b82b1589f7915a2120de39274c
https://github.com/opencv/opencv
https://github.com/opencv/opencv/commit/7bbe1a53cfc097b82b1589f7915a2120de39274c
imgcodecs(pxm): fix memcpy size
1
bool PxMDecoder::readData( Mat& img ) { int color = img.channels() > 1; uchar* data = img.ptr(); PaletteEntry palette[256]; bool result = false; const int bit_depth = CV_ELEM_SIZE1(m_type)*8; const int src_pitch = divUp(m_width*m_bpp*(bit_depth/8), 8); int nch = CV_MAT_CN(m_type); int...
90,021,654,730,776,400,000,000,000,000,000,000,000
grfmt_pxm.cpp
39,159,401,575,500,720,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2017-17760
OpenCV 3.3.1 has a Buffer Overflow in the cv::PxMDecoder::readData function in grfmt_pxm.cpp, because an incorrect size value is used.
https://nvd.nist.gov/vuln/detail/CVE-2017-17760
263,026
opencv
7bbe1a53cfc097b82b1589f7915a2120de39274c
https://github.com/opencv/opencv
https://github.com/opencv/opencv/commit/7bbe1a53cfc097b82b1589f7915a2120de39274c
imgcodecs(pxm): fix memcpy size
0
bool PxMDecoder::readData( Mat& img ) { int color = img.channels() > 1; uchar* data = img.ptr(); PaletteEntry palette[256]; bool result = false; const int bit_depth = CV_ELEM_SIZE1(m_type)*8; const int src_pitch = divUp(m_width*m_bpp*(bit_depth/8), 8); int nch = CV_MAT_CN(m_type); int...
66,850,547,100,001,750,000,000,000,000,000,000,000
grfmt_pxm.cpp
144,645,702,852,848,550,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2017-17760
OpenCV 3.3.1 has a Buffer Overflow in the cv::PxMDecoder::readData function in grfmt_pxm.cpp, because an incorrect size value is used.
https://nvd.nist.gov/vuln/detail/CVE-2017-17760
197,770
deepin-clone
e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab
https://github.com/linuxdeepin/deepin-clone
https://github.com/linuxdeepin/deepin-clone/commit/e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab
fix: Do not use the "/tmp" directory https://github.com/linuxdeepin/deepin-clone/issues/16 https://bugzilla.opensuse.org/show_bug.cgi?id=1130388
1
QString Helper::temporaryMountDevice(const QString &device, const QString &name, bool readonly) { QString mount_point = mountPoint(device); if (!mount_point.isEmpty()) return mount_point; mount_point = "%1/.%2/mount/%3"; const QStringList &tmp_paths = QStandardPaths::standardLocations(QStandar...
229,537,522,612,288,320,000,000,000,000,000,000,000
helper.cpp
231,175,827,715,282,260,000,000,000,000,000,000,000
[ "CWE-61" ]
CVE-2019-13227
In GUI mode, deepin-clone before 1.1.3 creates a log file at the fixed path /tmp/.deepin-clone.log as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled.
https://nvd.nist.gov/vuln/detail/CVE-2019-13227
263,793
deepin-clone
e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab
https://github.com/linuxdeepin/deepin-clone
https://github.com/linuxdeepin/deepin-clone/commit/e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab
fix: Do not use the "/tmp" directory https://github.com/linuxdeepin/deepin-clone/issues/16 https://bugzilla.opensuse.org/show_bug.cgi?id=1130388
0
QString Helper::temporaryMountDevice(const QString &device, const QString &name, bool readonly) { QString mount_point = mountPoint(device); if (!mount_point.isEmpty()) return mount_point; mount_point = "%1/.%2/mount/%3"; const QStringList &tmp_paths = QStandardPaths::standardLocations(QStandar...
135,100,914,563,799,930,000,000,000,000,000,000,000
helper.cpp
293,129,917,170,309,270,000,000,000,000,000,000,000
[ "CWE-61" ]
CVE-2019-13227
In GUI mode, deepin-clone before 1.1.3 creates a log file at the fixed path /tmp/.deepin-clone.log as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled.
https://nvd.nist.gov/vuln/detail/CVE-2019-13227
197,771
deepin-clone
e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab
https://github.com/linuxdeepin/deepin-clone
https://github.com/linuxdeepin/deepin-clone/commit/e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab
fix: Do not use the "/tmp" directory https://github.com/linuxdeepin/deepin-clone/issues/16 https://bugzilla.opensuse.org/show_bug.cgi?id=1130388
1
bool BootDoctor::fix(const QString &partDevice) { m_lastErrorString.clear(); DDevicePartInfo part_info(partDevice); const QString part_old_uuid = part_info.uuid(); if (Helper::processExec("lsblk -s -d -n -o UUID") == 0) { if (Helper::lastProcessStandardOutput().contains(part_old_uuid.toLatin1(...
137,812,368,379,736,330,000,000,000,000,000,000,000
bootdoctor.cpp
259,336,322,687,552,260,000,000,000,000,000,000,000
[ "CWE-61" ]
CVE-2019-13227
In GUI mode, deepin-clone before 1.1.3 creates a log file at the fixed path /tmp/.deepin-clone.log as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled.
https://nvd.nist.gov/vuln/detail/CVE-2019-13227
263,811
deepin-clone
e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab
https://github.com/linuxdeepin/deepin-clone
https://github.com/linuxdeepin/deepin-clone/commit/e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab
fix: Do not use the "/tmp" directory https://github.com/linuxdeepin/deepin-clone/issues/16 https://bugzilla.opensuse.org/show_bug.cgi?id=1130388
0
bool BootDoctor::fix(const QString &partDevice) { m_lastErrorString.clear(); DDevicePartInfo part_info(partDevice); const QString part_old_uuid = part_info.uuid(); if (Helper::processExec("lsblk -s -d -n -o UUID") == 0) { if (Helper::lastProcessStandardOutput().contains(part_old_uuid.toLatin1(...
103,345,989,421,805,010,000,000,000,000,000,000,000
bootdoctor.cpp
262,993,647,621,593,150,000,000,000,000,000,000,000
[ "CWE-61" ]
CVE-2019-13227
In GUI mode, deepin-clone before 1.1.3 creates a log file at the fixed path /tmp/.deepin-clone.log as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled.
https://nvd.nist.gov/vuln/detail/CVE-2019-13227
197,772
deepin-clone
e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab
https://github.com/linuxdeepin/deepin-clone
https://github.com/linuxdeepin/deepin-clone/commit/e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab
fix: Do not use the "/tmp" directory https://github.com/linuxdeepin/deepin-clone/issues/16 https://bugzilla.opensuse.org/show_bug.cgi?id=1130388
1
bool Helper::getPartitionSizeInfo(const QString &partDevice, qint64 *used, qint64 *free, int *blockSize) { QProcess process; QStringList env_list = QProcess::systemEnvironment(); env_list.append("LANG=C"); process.setEnvironment(env_list); if (Helper::isMounted(partDevice)) { process.start...
167,478,247,065,967,900,000,000,000,000,000,000,000
helper.cpp
231,175,827,715,282,260,000,000,000,000,000,000,000
[ "CWE-61" ]
CVE-2019-13227
In GUI mode, deepin-clone before 1.1.3 creates a log file at the fixed path /tmp/.deepin-clone.log as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled.
https://nvd.nist.gov/vuln/detail/CVE-2019-13227
263,816
deepin-clone
e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab
https://github.com/linuxdeepin/deepin-clone
https://github.com/linuxdeepin/deepin-clone/commit/e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab
fix: Do not use the "/tmp" directory https://github.com/linuxdeepin/deepin-clone/issues/16 https://bugzilla.opensuse.org/show_bug.cgi?id=1130388
0
bool Helper::getPartitionSizeInfo(const QString &partDevice, qint64 *used, qint64 *free, int *blockSize) { QProcess process; QStringList env_list = QProcess::systemEnvironment(); env_list.append("LANG=C"); process.setEnvironment(env_list); if (Helper::isMounted(partDevice)) { process.start...
218,409,291,674,521,480,000,000,000,000,000,000,000
helper.cpp
293,129,917,170,309,270,000,000,000,000,000,000,000
[ "CWE-61" ]
CVE-2019-13227
In GUI mode, deepin-clone before 1.1.3 creates a log file at the fixed path /tmp/.deepin-clone.log as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled.
https://nvd.nist.gov/vuln/detail/CVE-2019-13227
197,780
ntopng
30610bda60cbfc058f90a1c0a17d0e8f4516221a
https://github.com/ntop/ntopng
https://github.com/ntop/ntopng/commit/30610bda60cbfc058f90a1c0a17d0e8f4516221a
Added code to randomize values returned by rand()
1
HTTPserver::HTTPserver(const char *_docs_dir, const char *_scripts_dir) { struct mg_callbacks callbacks; static char ports[256], ssl_cert_path[MAX_PATH] = { 0 }, access_log_path[MAX_PATH] = { 0 }; const char *http_binding_addr = ntop->getPrefs()->get_http_binding_address(); const char *https_binding_addr = ntop...
54,193,755,925,649,510,000,000,000,000,000,000,000
HTTPserver.cpp
224,519,242,937,859,700,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2018-12520
An issue was discovered in ntopng 3.4 before 3.4.180617. The PRNG involved in the generation of session IDs is not seeded at program startup. This results in deterministic session IDs being allocated for active user sessions. An attacker with foreknowledge of the operating system and standard library in use by the host...
https://nvd.nist.gov/vuln/detail/CVE-2018-12520
264,063
ntopng
30610bda60cbfc058f90a1c0a17d0e8f4516221a
https://github.com/ntop/ntopng
https://github.com/ntop/ntopng/commit/30610bda60cbfc058f90a1c0a17d0e8f4516221a
Added code to randomize values returned by rand()
0
HTTPserver::HTTPserver(const char *_docs_dir, const char *_scripts_dir) { struct mg_callbacks callbacks; static char ports[256], ssl_cert_path[MAX_PATH] = { 0 }, access_log_path[MAX_PATH] = { 0 }; const char *http_binding_addr = ntop->getPrefs()->get_http_binding_address(); const char *https_binding_addr = ntop...
314,489,935,151,334,800,000,000,000,000,000,000,000
HTTPserver.cpp
274,350,598,770,508,740,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2018-12520
An issue was discovered in ntopng 3.4 before 3.4.180617. The PRNG involved in the generation of session IDs is not seeded at program startup. This results in deterministic session IDs being allocated for active user sessions. An attacker with foreknowledge of the operating system and standard library in use by the host...
https://nvd.nist.gov/vuln/detail/CVE-2018-12520
197,784
ytnef
22f8346c8d4f0020a40d9f258fdb3bfc097359cc
https://github.com/Yeraze/ytnef
https://github.com/Yeraze/ytnef/commit/22f8346c8d4f0020a40d9f258fdb3bfc097359cc
Added safety check for Compressed RTF Streams You could potentially overflow the input pointer. in response to #34
1
BYTE *DecompressRTF(variableLength *p, int *size) { BYTE *dst; // destination for uncompressed bytes BYTE *src; unsigned int in; unsigned int out; variableLength comp_Prebuf; ULONG compressedSize, uncompressedSize, magic; comp_Prebuf.size = strlen(RTF_PREBUF); comp_Prebuf.data = calloc(comp_Prebuf.size...
105,271,817,086,370,740,000,000,000,000,000,000,000
ytnef.c
168,485,647,867,116,590,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2017-6802
An issue was discovered in ytnef before 1.9.2. There is a potential heap-based buffer over-read on incoming Compressed RTF Streams, related to DecompressRTF() in libytnef.
https://nvd.nist.gov/vuln/detail/CVE-2017-6802
264,082
ytnef
22f8346c8d4f0020a40d9f258fdb3bfc097359cc
https://github.com/Yeraze/ytnef
https://github.com/Yeraze/ytnef/commit/22f8346c8d4f0020a40d9f258fdb3bfc097359cc
Added safety check for Compressed RTF Streams You could potentially overflow the input pointer. in response to #34
0
BYTE *DecompressRTF(variableLength *p, int *size) { BYTE *dst; // destination for uncompressed bytes BYTE *src; unsigned int in; unsigned int out; variableLength comp_Prebuf; ULONG compressedSize, uncompressedSize, magic; comp_Prebuf.size = strlen(RTF_PREBUF); comp_Prebuf.data = calloc(comp_Prebuf.size...
145,166,241,803,981,530,000,000,000,000,000,000,000
ytnef.c
11,697,525,817,261,679,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2017-6802
An issue was discovered in ytnef before 1.9.2. There is a potential heap-based buffer over-read on incoming Compressed RTF Streams, related to DecompressRTF() in libytnef.
https://nvd.nist.gov/vuln/detail/CVE-2017-6802
197,790
upx
e2f60adc95334f47e286838dac33160819c5d74d
https://github.com/upx/upx
https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d
Detect 0==DT_SYMTAB in invert_pt_dynamic() https://github.com/upx/upx/issues/333 modified: p_lx_elf.cpp
1
PackLinuxElf32::invert_pt_dynamic(Elf32_Dyn const *dynp) { if (dt_table[Elf32_Dyn::DT_NULL]) { return; // not 1st time; do not change upx_dt_init } Elf32_Dyn const *const dynp0 = dynp; unsigned ndx = 1+ 0; if (dynp) for (; ; ++ndx, ++dynp) { unsigned const d_tag = get_te32(&dynp...
168,742,274,543,458,070,000,000,000,000,000,000,000
p_lx_elf.cpp
80,639,365,896,673,115,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-27787
A Segmentaation fault was found in UPX in invert_pt_dynamic() function in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2020-27787
264,156
upx
e2f60adc95334f47e286838dac33160819c5d74d
https://github.com/upx/upx
https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d
Detect 0==DT_SYMTAB in invert_pt_dynamic() https://github.com/upx/upx/issues/333 modified: p_lx_elf.cpp
0
PackLinuxElf32::invert_pt_dynamic(Elf32_Dyn const *dynp) { if (dt_table[Elf32_Dyn::DT_NULL]) { return; // not 1st time; do not change upx_dt_init } Elf32_Dyn const *const dynp0 = dynp; unsigned ndx = 1+ 0; if (dynp) for (; ; ++ndx, ++dynp) { unsigned const d_tag = get_te32(&dynp...
27,151,378,830,150,997,000,000,000,000,000,000,000
p_lx_elf.cpp
230,802,678,723,023,260,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-27787
A Segmentaation fault was found in UPX in invert_pt_dynamic() function in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2020-27787
197,791
upx
e2f60adc95334f47e286838dac33160819c5d74d
https://github.com/upx/upx
https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d
Detect 0==DT_SYMTAB in invert_pt_dynamic() https://github.com/upx/upx/issues/333 modified: p_lx_elf.cpp
1
PackLinuxElf64::invert_pt_dynamic(Elf64_Dyn const *dynp) { if (dt_table[Elf64_Dyn::DT_NULL]) { return; // not 1st time; do not change upx_dt_init } Elf64_Dyn const *const dynp0 = dynp; unsigned ndx = 1+ 0; if (dynp) for (; ; ++ndx, ++dynp) { upx_uint64_t const d_tag = get_te64(&...
159,162,397,024,130,120,000,000,000,000,000,000,000
p_lx_elf.cpp
80,639,365,896,673,115,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-27787
A Segmentaation fault was found in UPX in invert_pt_dynamic() function in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2020-27787
264,155
upx
e2f60adc95334f47e286838dac33160819c5d74d
https://github.com/upx/upx
https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d
Detect 0==DT_SYMTAB in invert_pt_dynamic() https://github.com/upx/upx/issues/333 modified: p_lx_elf.cpp
0
PackLinuxElf64::invert_pt_dynamic(Elf64_Dyn const *dynp) { if (dt_table[Elf64_Dyn::DT_NULL]) { return; // not 1st time; do not change upx_dt_init } Elf64_Dyn const *const dynp0 = dynp; unsigned ndx = 1+ 0; if (dynp) for (; ; ++ndx, ++dynp) { upx_uint64_t const d_tag = get_te64(&...
339,264,645,758,466,860,000,000,000,000,000,000,000
p_lx_elf.cpp
230,802,678,723,023,260,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-27787
A Segmentaation fault was found in UPX in invert_pt_dynamic() function in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2020-27787
197,810
lrzip
5faf80cd53ecfd16b636d653483144cd12004f46
https://github.com/ckolivas/lrzip
https://github.com/ckolivas/lrzip/commit/5faf80cd53ecfd16b636d653483144cd12004f46
Fix control->suffix being deallocated as heap memory as reported by Pietro Borrello.
1
bool initialise_control(rzip_control *control) { time_t now_t, tdiff; char localeptr[] = "./", *eptr; /* for environment */ size_t len; memset(control, 0, sizeof(rzip_control)); control->msgout = stderr; control->msgerr = stderr; register_outputfile(control, control->msgout); control->flags = FLAG_SHOW_PROGRES...
139,702,688,972,184,770,000,000,000,000,000,000,000
lrzip.c
265,004,371,865,348,300,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-28044
Irzip v0.640 was discovered to contain a heap memory corruption via the component lrzip.c:initialise_control.
https://nvd.nist.gov/vuln/detail/CVE-2022-28044
264,528
lrzip
5faf80cd53ecfd16b636d653483144cd12004f46
https://github.com/ckolivas/lrzip
https://github.com/ckolivas/lrzip/commit/5faf80cd53ecfd16b636d653483144cd12004f46
Fix control->suffix being deallocated as heap memory as reported by Pietro Borrello.
0
bool initialise_control(rzip_control *control) { time_t now_t, tdiff; char localeptr[] = "./", *eptr; /* for environment */ size_t len; memset(control, 0, sizeof(rzip_control)); control->msgout = stderr; control->msgerr = stderr; register_outputfile(control, control->msgout); control->flags = FLAG_SHOW_PROGRES...
192,762,443,616,812,900,000,000,000,000,000,000,000
lrzip.c
332,267,380,175,190,360,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-28044
Irzip v0.640 was discovered to contain a heap memory corruption via the component lrzip.c:initialise_control.
https://nvd.nist.gov/vuln/detail/CVE-2022-28044
197,839
gpac
b8f8b202d4fc23eb0ab4ce71ae96536ca6f5d3f8
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/b8f8b202d4fc23eb0ab4ce71ae96536ca6f5d3f8
fixed #1757
1
GF_Err trak_box_size(GF_Box *s) { u32 pos=0; GF_TrackBox *ptr = (GF_TrackBox *)s; if (ptr->sample_encryption && ptr->sample_encryption->load_needed) { GF_Err e = senc_Parse(ptr->moov->mov->movieFileMap->bs, ptr, NULL, ptr->sample_encryption); if (e) return e; } gf_isom_check_position(s, (GF_Box *)ptr->Heade...
216,523,154,065,014,800,000,000,000,000,000,000,000
box_code_base.c
83,734,944,677,882,145,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-32135
The trak_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
https://nvd.nist.gov/vuln/detail/CVE-2021-32135
264,781
gpac
b8f8b202d4fc23eb0ab4ce71ae96536ca6f5d3f8
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/b8f8b202d4fc23eb0ab4ce71ae96536ca6f5d3f8
fixed #1757
0
GF_Err trak_box_size(GF_Box *s) { u32 pos=0; GF_TrackBox *ptr = (GF_TrackBox *)s; if (ptr->sample_encryption && ptr->sample_encryption->load_needed) { if (!ptr->moov || !!ptr->moov->mov || !ptr->moov->mov->movieFileMap) return GF_ISOM_INVALID_FILE; GF_Err e = senc_Parse(ptr->moov->mov->movieFileMap->bs, ptr...
126,935,338,137,200,140,000,000,000,000,000,000,000
box_code_base.c
284,814,802,588,874,630,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-32135
The trak_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
https://nvd.nist.gov/vuln/detail/CVE-2021-32135
197,904
ImageMagick
a33f7498f9052b50e8fe8c8422a11ba84474cb42
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42
https://github.com/ImageMagick/ImageMagick/issues/551
1
static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ThrowDCMException(exception,message) \ { \ if (data != (unsigned char *) NULL) \ data=(unsigned char *) RelinquishMagickMemory(data); \ if (stream_info != (DCMStreamInfo *) NULL) \ stream_info=(DCMStreamInfo *) Relinq...
175,379,189,022,605,700,000,000,000,000,000,000,000
dcm.c
177,606,615,657,733,660,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-12644
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadDCMImage in coders\dcm.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12644
265,496
ImageMagick
a33f7498f9052b50e8fe8c8422a11ba84474cb42
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42
https://github.com/ImageMagick/ImageMagick/issues/551
0
static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ThrowDCMException(exception,message) \ { \ if (data != (unsigned char *) NULL) \ data=(unsigned char *) RelinquishMagickMemory(data); \ if (stream_info != (DCMStreamInfo *) NULL) \ stream_info=(DCMStreamInfo *) Relinq...
76,022,737,936,981,620,000,000,000,000,000,000,000
dcm.c
28,315,763,789,189,824,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-12644
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadDCMImage in coders\dcm.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12644
197,911
git
9a6bbee8006c24b46a85d29e7b38cfa79e9ab21b
https://github.com/git/git
https://github.com/git/git/commit/9a6bbee8006c24b46a85d29e7b38cfa79e9ab21b
credential: avoid writing values with newlines The credential protocol that we use to speak to helpers can't represent values with newlines in them. This was an intentional design choice to keep the protocol simple, since none of the values we pass should generally have newlines. However, if we _do_ encounter a newli...
1
static void credential_write_item(FILE *fp, const char *key, const char *value) { if (!value) return; fprintf(fp, "%s=%s\n", key, value); }
166,618,074,518,075,750,000,000,000,000,000,000,000
credential.c
224,003,697,457,701,130,000,000,000,000,000,000,000
[ "CWE-61" ]
CVE-2020-5260
Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs ...
https://nvd.nist.gov/vuln/detail/CVE-2020-5260
265,534
git
9a6bbee8006c24b46a85d29e7b38cfa79e9ab21b
https://github.com/git/git
https://github.com/git/git/commit/9a6bbee8006c24b46a85d29e7b38cfa79e9ab21b
credential: avoid writing values with newlines The credential protocol that we use to speak to helpers can't represent values with newlines in them. This was an intentional design choice to keep the protocol simple, since none of the values we pass should generally have newlines. However, if we _do_ encounter a newli...
0
static void credential_write_item(FILE *fp, const char *key, const char *value) { if (!value) return; if (strchr(value, '\n')) die("credential value for %s contains newline", key); fprintf(fp, "%s=%s\n", key, value); }
150,285,164,564,301,070,000,000,000,000,000,000,000
credential.c
171,015,203,136,278,500,000,000,000,000,000,000,000
[ "CWE-61" ]
CVE-2020-5260
Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs ...
https://nvd.nist.gov/vuln/detail/CVE-2020-5260
197,917
nDPI
b69177be2fbe01c2442239a61832c44e40136c05
https://github.com/ntop/nDPI
https://github.com/ntop/nDPI/commit/b69177be2fbe01c2442239a61832c44e40136c05
Adds bound check in oracle protocol Found by oss-fuzz https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21780
1
void ndpi_search_oracle(struct ndpi_detection_module_struct *ndpi_struct, struct ndpi_flow_struct *flow) { struct ndpi_packet_struct *packet = &flow->packet; u_int16_t dport = 0, sport = 0; NDPI_LOG_DBG(ndpi_struct, "search ORACLE\n"); if(packet->tcp != NULL) { sport = ntohs(packet->tcp->source), dport = ...
281,684,134,061,809,580,000,000,000,000,000,000,000
oracle.c
165,027,917,166,327,220,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-15476
In nDPI through 3.2, the Oracle protocol dissector has a heap-based buffer over-read in ndpi_search_oracle in lib/protocols/oracle.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-15476
265,603
nDPI
b69177be2fbe01c2442239a61832c44e40136c05
https://github.com/ntop/nDPI
https://github.com/ntop/nDPI/commit/b69177be2fbe01c2442239a61832c44e40136c05
Adds bound check in oracle protocol Found by oss-fuzz https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21780
0
void ndpi_search_oracle(struct ndpi_detection_module_struct *ndpi_struct, struct ndpi_flow_struct *flow) { struct ndpi_packet_struct *packet = &flow->packet; u_int16_t dport = 0, sport = 0; NDPI_LOG_DBG(ndpi_struct, "search ORACLE\n"); if(packet->tcp != NULL) { sport = ntohs(packet->tcp->source), dport = ...
79,839,375,878,257,920,000,000,000,000,000,000,000
oracle.c
9,130,836,932,672,496,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-15476
In nDPI through 3.2, the Oracle protocol dissector has a heap-based buffer over-read in ndpi_search_oracle in lib/protocols/oracle.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-15476
197,947
ImageMagick
8c35502217c1879cb8257c617007282eee3fe1cc
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8c35502217c1879cb8257c617007282eee3fe1cc
Added missing return to avoid use after free.
1
void Magick::Image::read(MagickCore::Image *image, MagickCore::ExceptionInfo *exceptionInfo) { // Ensure that multiple image frames were not read. if (image != (MagickCore::Image *) NULL && image->next != (MagickCore::Image *) NULL) { MagickCore::Image *next; // Destroy any extra im...
128,385,256,042,772,350,000,000,000,000,000,000,000
Image.cpp
59,346,041,863,091,020,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-17499
ImageMagick before 6.9.9-24 and 7.x before 7.0.7-12 has a use-after-free in Magick::Image::read in Magick++/lib/Image.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2017-17499
266,361
ImageMagick
8c35502217c1879cb8257c617007282eee3fe1cc
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8c35502217c1879cb8257c617007282eee3fe1cc
Added missing return to avoid use after free.
0
void Magick::Image::read(MagickCore::Image *image, MagickCore::ExceptionInfo *exceptionInfo) { // Ensure that multiple image frames were not read. if (image != (MagickCore::Image *) NULL && image->next != (MagickCore::Image *) NULL) { MagickCore::Image *next; // Destroy any extra im...
240,767,525,039,625,000,000,000,000,000,000,000,000
Image.cpp
150,845,168,494,242,220,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-17499
ImageMagick before 6.9.9-24 and 7.x before 7.0.7-12 has a use-after-free in Magick::Image::read in Magick++/lib/Image.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2017-17499
197,961
xrootd
befa2e627a5a33a38c92db3e57c07d8246a24acf
https://github.com/xrootd/xrootd
https://github.com/xrootd/xrootd/commit/befa2e627a5a33a38c92db3e57c07d8246a24acf
secgsi: do not build/package libXrdSecgsiGMAPLDAP-4.so The way the LDAP query is implemented may represent a security threat. Any related building and packaging reference is removed. The code is left in place (for the time being) to remind its functionality in the case a sanitized version is required.
1
void DefaultEnv::Initialize() { sLog = new Log(); SetUpLog(); sEnv = new DefaultEnv(); sForkHandler = new ForkHandler(); sFileTimer = new FileTimer(); sPlugInManager = new PlugInManager(); sPlugInManager->ProcessEnvironmentSettings(); sForkHandler->Registe...
271,962,138,013,995,260,000,000,000,000,000,000,000
XrdClDefaultEnv.cc
257,734,601,399,227,400,000,000,000,000,000,000,000
[ "CWE-78" ]
CVE-2017-1000215
ROOT xrootd version 4.6.0 and below is vulnerable to an unauthenticated shell command injection resulting in remote code execution
https://nvd.nist.gov/vuln/detail/CVE-2017-1000215
266,951
xrootd
befa2e627a5a33a38c92db3e57c07d8246a24acf
https://github.com/xrootd/xrootd
https://github.com/xrootd/xrootd/commit/befa2e627a5a33a38c92db3e57c07d8246a24acf
secgsi: do not build/package libXrdSecgsiGMAPLDAP-4.so The way the LDAP query is implemented may represent a security threat. Any related building and packaging reference is removed. The code is left in place (for the time being) to remind its functionality in the case a sanitized version is required.
0
void DefaultEnv::Initialize() { sLog = new Log(); SetUpLog(); sEnv = new DefaultEnv(); sForkHandler = new ForkHandler(); sFileTimer = new FileTimer(); sPlugInManager = new PlugInManager(); sPlugInManager->ProcessEnvironmentSettings(); sForkHandler->Registe...
248,223,613,231,227,360,000,000,000,000,000,000,000
XrdClDefaultEnv.cc
27,527,107,028,920,280,000,000,000,000,000,000,000
[ "CWE-78" ]
CVE-2017-1000215
ROOT xrootd version 4.6.0 and below is vulnerable to an unauthenticated shell command injection resulting in remote code execution
https://nvd.nist.gov/vuln/detail/CVE-2017-1000215
197,991
GameNetworkingSockets
bea84e2844b647532a9b7fbc3a6a8989d66e49e3
https://github.com/ValveSoftware/GameNetworkingSockets
https://github.com/ValveSoftware/GameNetworkingSockets/commit/bea84e2844b647532a9b7fbc3a6a8989d66e49e3
Check if output buffer is too small. It really seems like libsodium (whose entire purpose is to make crypto idiot-proof) making me mess with these details is a flaw in the API design. Also, correct Hungarian.
1
bool AES_GCM_DecryptContext::Decrypt( const void *pEncryptedDataAndTag, size_t cbEncryptedDataAndTag, const void *pIV, void *pPlaintextData, uint32 *pcbPlaintextData, const void *pAdditionalAuthenticationData, size_t cbAuthenticationData ) { unsigned long long pcbPlaintextData_longlong; const int nDecryptR...
78,921,504,189,247,940,000,000,000,000,000,000,000
crypto_libsodium.cpp
68,020,576,512,198,760,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-6018
Valve's Game Networking Sockets prior to version v1.2.0 improperly handles long encrypted messages in function AES_GCM_DecryptContext::Decrypt() when compiled using libsodium, leading to a Stack-Based Buffer Overflow and resulting in a memory corruption and possibly even a remote code execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-6018
267,850
GameNetworkingSockets
bea84e2844b647532a9b7fbc3a6a8989d66e49e3
https://github.com/ValveSoftware/GameNetworkingSockets
https://github.com/ValveSoftware/GameNetworkingSockets/commit/bea84e2844b647532a9b7fbc3a6a8989d66e49e3
Check if output buffer is too small. It really seems like libsodium (whose entire purpose is to make crypto idiot-proof) making me mess with these details is a flaw in the API design. Also, correct Hungarian.
0
bool AES_GCM_DecryptContext::Decrypt( const void *pEncryptedDataAndTag, size_t cbEncryptedDataAndTag, const void *pIV, void *pPlaintextData, uint32 *pcbPlaintextData, const void *pAdditionalAuthenticationData, size_t cbAuthenticationData ) { // Make sure caller's buffer is big enough to hold the result if ( cbEnc...
331,949,284,797,609,460,000,000,000,000,000,000,000
crypto_libsodium.cpp
234,023,748,272,473,240,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-6018
Valve's Game Networking Sockets prior to version v1.2.0 improperly handles long encrypted messages in function AES_GCM_DecryptContext::Decrypt() when compiled using libsodium, leading to a Stack-Based Buffer Overflow and resulting in a memory corruption and possibly even a remote code execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-6018
198,008
tensorflow
8b5b9dc96666a3a5d27fad7179ff215e3b74b67c
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/8b5b9dc96666a3a5d27fad7179ff215e3b74b67c
Completely rewrite `GetMatchingPaths`. The current parallel implementation is too complex (lambda inside lambda, two levels of parallelism) and has a read outside of bounds issue. The new implementation cleans up artifacts from the previous implementations that were left in the code as it evolves. We add multiple hel...
1
Status GetMatchingPaths(FileSystem* fs, Env* env, const string& pattern, std::vector<string>* results) { results->clear(); if (pattern.empty()) { return Status::OK(); } string fixed_prefix = pattern.substr(0, pattern.find_first_of("*?[\\")); string eval_pattern = pattern; string...
220,271,922,948,681,900,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2020-26269
In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matching filesystem paths to globbing pattern is vulnerable to an access out of bounds of the array holding the directories. There are multiple invariants and preconditions that are assumed by the parallel implementation of GetMatchingPat...
https://nvd.nist.gov/vuln/detail/CVE-2020-26269
267,944
tensorflow
8b5b9dc96666a3a5d27fad7179ff215e3b74b67c
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/8b5b9dc96666a3a5d27fad7179ff215e3b74b67c
Completely rewrite `GetMatchingPaths`. The current parallel implementation is too complex (lambda inside lambda, two levels of parallelism) and has a read outside of bounds issue. The new implementation cleans up artifacts from the previous implementations that were left in the code as it evolves. We add multiple hel...
0
Status GetMatchingPaths(FileSystem* fs, Env* env, const string& pattern, std::vector<string>* results) { // Check that `fs`, `env` and `results` are non-null. if (fs == nullptr || env == nullptr || results == nullptr) { return Status(tensorflow::error::INVALID_ARGUMENT, ...
170,027,147,149,985,960,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2020-26269
In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matching filesystem paths to globbing pattern is vulnerable to an access out of bounds of the array holding the directories. There are multiple invariants and preconditions that are assumed by the parallel implementation of GetMatchingPat...
https://nvd.nist.gov/vuln/detail/CVE-2020-26269
198,120
php-src
28022c9b1fd937436ab67bb3d61f652c108baf96
https://github.com/php/php-src
https://github.com/php/php-src/commit/28022c9b1fd937436ab67bb3d61f652c108baf96
Fix bug#72697 - select_colors write out-of-bounds (cherry picked from commit b6f13a5ef9d6280cf984826a5de012a32c396cd4) Conflicts: ext/gd/gd.c
1
PHP_FUNCTION(imagetruecolortopalette) { zval *IM; zend_bool dither; zend_long ncolors; gdImagePtr im; if (zend_parse_parameters(ZEND_NUM_ARGS(), "rbl", &IM, &dither, &ncolors) == FAILURE) { return; } if ((im = (gdImagePtr)zend_fetch_resource(Z_RES_P(IM), "Image", le_gd)) == NULL) { RETURN_FALSE; } if (...
282,053,410,692,908,480,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-7126
The imagetruecolortopalette function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate the number of colors, which allows remote attackers to cause a denial of service (select_colors allocation error and out-of-bounds write) or possibly have unspecified other impact via a large value ...
https://nvd.nist.gov/vuln/detail/CVE-2016-7126
269,481
php-src
28022c9b1fd937436ab67bb3d61f652c108baf96
https://github.com/php/php-src
https://github.com/php/php-src/commit/28022c9b1fd937436ab67bb3d61f652c108baf96
Fix bug#72697 - select_colors write out-of-bounds (cherry picked from commit b6f13a5ef9d6280cf984826a5de012a32c396cd4) Conflicts: ext/gd/gd.c
0
PHP_FUNCTION(imagetruecolortopalette) { zval *IM; zend_bool dither; zend_long ncolors; gdImagePtr im; if (zend_parse_parameters(ZEND_NUM_ARGS(), "rbl", &IM, &dither, &ncolors) == FAILURE) { return; } if ((im = (gdImagePtr)zend_fetch_resource(Z_RES_P(IM), "Image", le_gd)) == NULL) { RETURN_FALSE; } if (...
91,091,358,277,684,000,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-7126
The imagetruecolortopalette function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate the number of colors, which allows remote attackers to cause a denial of service (select_colors allocation error and out-of-bounds write) or possibly have unspecified other impact via a large value ...
https://nvd.nist.gov/vuln/detail/CVE-2016-7126
198,129
tensorflow
2c74674348a4708ced58ad6eb1b23354df8ee044
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044
Prevent division by 0 PiperOrigin-RevId: 370979352 Change-Id: Ic79191c316d986fc6072ecaebfec9d5f2b924d00
1
TfLiteStatus ResizeOutputTensor(TfLiteContext* context, BatchToSpaceNDContext* op_context) { TfLiteIntArray* input_size = op_context->input->dims; const int* block_shape = GetTensorData<int32>(op_context->block_shape); const int* crops = GetTensorData<int32>(op_context->crops); ...
20,578,090,947,293,235,000,000,000,000,000,000,000
batch_to_space_nd.cc
15,177,301,722,452,372,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-29593
TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `BatchToSpaceNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/b5ed552fe55895aee8bd8b191f744a069957d18d/tensorflow/lite/kernels/batch_to_space_nd.cc#L81-L82). An att...
https://nvd.nist.gov/vuln/detail/CVE-2021-29593
269,641
tensorflow
2c74674348a4708ced58ad6eb1b23354df8ee044
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044
Prevent division by 0 PiperOrigin-RevId: 370979352 Change-Id: Ic79191c316d986fc6072ecaebfec9d5f2b924d00
0
TfLiteStatus ResizeOutputTensor(TfLiteContext* context, BatchToSpaceNDContext* op_context) { TfLiteIntArray* input_size = op_context->input->dims; const int* block_shape = GetTensorData<int32>(op_context->block_shape); const int* crops = GetTensorData<int32>(op_context->crops); ...
268,627,781,829,132,800,000,000,000,000,000,000,000
batch_to_space_nd.cc
253,283,157,447,018,300,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-29593
TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `BatchToSpaceNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/b5ed552fe55895aee8bd8b191f744a069957d18d/tensorflow/lite/kernels/batch_to_space_nd.cc#L81-L82). An att...
https://nvd.nist.gov/vuln/detail/CVE-2021-29593
198,156
wangle
3b17ba10a82c71e7808760e027ac6af687e06074
https://github.com/facebook/wangle
https://github.com/facebook/wangle/commit/3b17ba10a82c71e7808760e027ac6af687e06074
AcceptRoutingHandler should not assume a folly::AsyncSocket Summary: There is no reason to perform a cast to folly::AsyncSocket, when all of the required behavior is in folly::AsyncTransportWrapper. CVE-2019-3554 Reviewed By: avasylev Differential Revision: D13599212 fbshipit-source-id: 3bb5475fe464c04cf5c04115f34...
1
void AcceptRoutingHandler<Pipeline, R>::onRoutingData( uint64_t connId, typename RoutingDataHandler<R>::RoutingData& routingData) { // Get the routing pipeline corresponding to this connection auto routingPipelineIter = routingPipelines_.find(connId); if (routingPipelineIter == routingPipelines_.end()) { ...
322,217,713,708,264,300,000,000,000,000,000,000,000
AcceptRoutingHandler-inl.h
279,450,957,089,156,860,000,000,000,000,000,000,000
[ "CWE-241" ]
CVE-2019-3554
Wangle's AcceptRoutingHandler incorrectly casts a socket when accepting a TLS 1.3 connection, leading to a potential denial of service attack against systems accepting such connections. This affects versions of Wangle prior to v2019.01.14.00
https://nvd.nist.gov/vuln/detail/CVE-2019-3554
269,922
wangle
3b17ba10a82c71e7808760e027ac6af687e06074
https://github.com/facebook/wangle
https://github.com/facebook/wangle/commit/3b17ba10a82c71e7808760e027ac6af687e06074
AcceptRoutingHandler should not assume a folly::AsyncSocket Summary: There is no reason to perform a cast to folly::AsyncSocket, when all of the required behavior is in folly::AsyncTransportWrapper. CVE-2019-3554 Reviewed By: avasylev Differential Revision: D13599212 fbshipit-source-id: 3bb5475fe464c04cf5c04115f34...
0
void AcceptRoutingHandler<Pipeline, R>::onRoutingData( uint64_t connId, typename RoutingDataHandler<R>::RoutingData& routingData) { // Get the routing pipeline corresponding to this connection auto routingPipelineIter = routingPipelines_.find(connId); if (routingPipelineIter == routingPipelines_.end()) { ...
117,774,277,179,739,760,000,000,000,000,000,000,000
AcceptRoutingHandler-inl.h
189,275,649,960,254,400,000,000,000,000,000,000,000
[ "CWE-241" ]
CVE-2019-3554
Wangle's AcceptRoutingHandler incorrectly casts a socket when accepting a TLS 1.3 connection, leading to a potential denial of service attack against systems accepting such connections. This affects versions of Wangle prior to v2019.01.14.00
https://nvd.nist.gov/vuln/detail/CVE-2019-3554
198,157
hermes
2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6
https://github.com/facebook/hermes
https://github.com/facebook/hermes/commit/2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6
Fix backward branching in SwitchImm. Summary: `SwitchImm` can subtract from `ip`, but it was reading the offset from a `uint32_t *` instead of `int32_t *`. Change the type to the correct one. Reviewed By: dulinriley Differential Revision: D23114516 fbshipit-source-id: d4ddab94eb16dc1ce479590851eeb1ab428bd5d6
1
CallResult<HermesValue> Interpreter::interpretFunction( Runtime *runtime, InterpreterState &state) { // The interepter is re-entrant and also saves/restores its IP via the runtime // whenever a call out is made (see the CAPTURE_IP_* macros). As such, failure // to preserve the IP across calls to interpete...
266,263,493,984,566,930,000,000,000,000,000,000,000
Interpreter.cpp
201,366,886,066,805,300,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-1913
An Integer signedness error in the JavaScript Interpreter in Facebook Hermes prior to commit 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6 allows attackers to cause a denial of service attack or a potential RCE via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of u...
https://nvd.nist.gov/vuln/detail/CVE-2020-1913
269,925
hermes
2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6
https://github.com/facebook/hermes
https://github.com/facebook/hermes/commit/2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6
Fix backward branching in SwitchImm. Summary: `SwitchImm` can subtract from `ip`, but it was reading the offset from a `uint32_t *` instead of `int32_t *`. Change the type to the correct one. Reviewed By: dulinriley Differential Revision: D23114516 fbshipit-source-id: d4ddab94eb16dc1ce479590851eeb1ab428bd5d6
0
CallResult<HermesValue> Interpreter::interpretFunction( Runtime *runtime, InterpreterState &state) { // The interepter is re-entrant and also saves/restores its IP via the runtime // whenever a call out is made (see the CAPTURE_IP_* macros). As such, failure // to preserve the IP across calls to interpete...
100,150,909,611,015,570,000,000,000,000,000,000,000
Interpreter.cpp
9,808,759,682,428,678,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-1913
An Integer signedness error in the JavaScript Interpreter in Facebook Hermes prior to commit 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6 allows attackers to cause a denial of service attack or a potential RCE via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of u...
https://nvd.nist.gov/vuln/detail/CVE-2020-1913
198,167
mongo
035cf2afc04988b22cb67f4ebfd77e9b344cb6e0
https://github.com/mongodb/mongo
https://github.com/mongodb/mongo/commit/035cf2afc04988b22cb67f4ebfd77e9b344cb6e0
SERVER-25335 avoid group and other permissions when creating .dbshell history file
1
int linenoiseHistorySave(const char* filename) { FILE* fp = fopen(filename, "wt"); if (fp == NULL) { return -1; } for (int j = 0; j < historyLen; ++j) { if (history[j][0] != '\0') { fprintf(fp, "%s\n", history[j]); } } fclose(fp); return 0; }
210,282,334,155,301,120,000,000,000,000,000,000,000
linenoise.cpp
224,200,173,107,286,300,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2016-6494
The client in MongoDB uses world-readable permissions on .dbshell history files, which might allow local users to obtain sensitive information by reading these files.
https://nvd.nist.gov/vuln/detail/CVE-2016-6494
270,107
mongo
035cf2afc04988b22cb67f4ebfd77e9b344cb6e0
https://github.com/mongodb/mongo
https://github.com/mongodb/mongo/commit/035cf2afc04988b22cb67f4ebfd77e9b344cb6e0
SERVER-25335 avoid group and other permissions when creating .dbshell history file
0
int linenoiseHistorySave(const char* filename) { FILE* fp; #if _POSIX_C_SOURCE >= 1 || _XOPEN_SOURCE || _POSIX_SOURCE int fd = open(filename, O_CREAT, S_IRUSR | S_IWUSR); if (fd == -1) { // report errno somehow? return -1; } fp = fdopen(fd, "wt"); #else fp = fopen(filename, "wt")...
114,344,261,318,973,140,000,000,000,000,000,000,000
linenoise.cpp
103,075,011,137,531,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2016-6494
The client in MongoDB uses world-readable permissions on .dbshell history files, which might allow local users to obtain sensitive information by reading these files.
https://nvd.nist.gov/vuln/detail/CVE-2016-6494
198,171
gpac
1ab4860609f2e7a35634930571e7d0531297e090
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090
fixed potential crash on PMT IOD parse - cf #1268 #1269
1
static void gf_m2ts_process_pmt(GF_M2TS_Demuxer *ts, GF_M2TS_SECTION_ES *pmt, GF_List *sections, u8 table_id, u16 ex_table_id, u8 version_number, u8 last_section_number, u32 status) { u32 info_length, pos, desc_len, evt_type, nb_es,i; u32 nb_sections; u32 data_size; u32 nb_hevc, nb_hevc_temp, nb_shvc, nb_shvc_temp,...
153,347,248,677,185,840,000,000,000,000,000,000,000
mpegts.c
70,942,582,638,372,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-20630
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer over-read in BS_ReadByte (called from gf_bs_read_bit) in utils/bitstream.c that can cause a denial of service via a crafted MP4 file.
https://nvd.nist.gov/vuln/detail/CVE-2019-20630
270,121
gpac
1ab4860609f2e7a35634930571e7d0531297e090
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090
fixed potential crash on PMT IOD parse - cf #1268 #1269
0
static void gf_m2ts_process_pmt(GF_M2TS_Demuxer *ts, GF_M2TS_SECTION_ES *pmt, GF_List *sections, u8 table_id, u16 ex_table_id, u8 version_number, u8 last_section_number, u32 status) { u32 info_length, pos, desc_len, evt_type, nb_es,i; u32 nb_sections; u32 data_size; u32 nb_hevc, nb_hevc_temp, nb_shvc, nb_shvc_temp,...
270,393,825,434,997,100,000,000,000,000,000,000,000
mpegts.c
236,951,061,127,109,280,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-20630
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer over-read in BS_ReadByte (called from gf_bs_read_bit) in utils/bitstream.c that can cause a denial of service via a crafted MP4 file.
https://nvd.nist.gov/vuln/detail/CVE-2019-20630
198,179
mongo
c151e0660b9736fe66b224f1129a16871165251b
https://github.com/mongodb/mongo
https://github.com/mongodb/mongo/commit/c151e0660b9736fe66b224f1129a16871165251b
SERVER-13573 Fix x.509 auth exception
1
Status CmdAuthenticate::_authenticateX509(const UserName& user, const BSONObj& cmdObj) { if (!getSSLManager()) { return Status(ErrorCodes::ProtocolError, "SSL support is required for the MONGODB-X509 mechanism."); } if(user.getDB() != "$external") { ...
50,722,082,310,142,280,000,000,000,000,000,000,000
authentication_commands.cpp
226,851,357,293,916,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-3971
The CmdAuthenticate::_authenticateX509 function in db/commands/authentication_commands.cpp in mongod in MongoDB 2.6.x before 2.6.2 allows remote attackers to cause a denial of service (daemon crash) by attempting authentication with an invalid X.509 client certificate.
https://nvd.nist.gov/vuln/detail/CVE-2014-3971
270,168
mongo
c151e0660b9736fe66b224f1129a16871165251b
https://github.com/mongodb/mongo
https://github.com/mongodb/mongo/commit/c151e0660b9736fe66b224f1129a16871165251b
SERVER-13573 Fix x.509 auth exception
0
Status CmdAuthenticate::_authenticateX509(const UserName& user, const BSONObj& cmdObj) { if (!getSSLManager()) { return Status(ErrorCodes::ProtocolError, "SSL support is required for the MONGODB-X509 mechanism."); } if(user.getDB() != "$external") { ...
113,012,449,931,941,130,000,000,000,000,000,000,000
authentication_commands.cpp
164,163,648,107,738,230,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-3971
The CmdAuthenticate::_authenticateX509 function in db/commands/authentication_commands.cpp in mongod in MongoDB 2.6.x before 2.6.2 allows remote attackers to cause a denial of service (daemon crash) by attempting authentication with an invalid X.509 client certificate.
https://nvd.nist.gov/vuln/detail/CVE-2014-3971
198,190
redis
4a7a4e42db8ff757cdf3f4a824f66426036034ef
https://github.com/antirez/redis
https://github.com/redis/redis/commit/4a7a4e42db8ff757cdf3f4a824f66426036034ef
Fix memory leak in streamGetEdgeID (#10753) si is initialized by streamIteratorStart(), we should call streamIteratorStop() on it when done. regression introduced in #9127 (redis 7.0)
1
void streamGetEdgeID(stream *s, int first, int skip_tombstones, streamID *edge_id) { streamIterator si; int64_t numfields; streamIteratorStart(&si,s,NULL,NULL,!first); si.skip_tombstones = skip_tombstones; int found = streamIteratorGetID(&si,edge_id,&numfields); if (!found) { streamID mi...
171,611,497,197,052,700,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2022-33105
Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID.
https://nvd.nist.gov/vuln/detail/CVE-2022-33105
270,253
redis
4a7a4e42db8ff757cdf3f4a824f66426036034ef
https://github.com/antirez/redis
https://github.com/redis/redis/commit/4a7a4e42db8ff757cdf3f4a824f66426036034ef
Fix memory leak in streamGetEdgeID (#10753) si is initialized by streamIteratorStart(), we should call streamIteratorStop() on it when done. regression introduced in #9127 (redis 7.0)
0
void streamGetEdgeID(stream *s, int first, int skip_tombstones, streamID *edge_id) { streamIterator si; int64_t numfields; streamIteratorStart(&si,s,NULL,NULL,!first); si.skip_tombstones = skip_tombstones; int found = streamIteratorGetID(&si,edge_id,&numfields); if (!found) { streamID mi...
188,082,569,445,356,330,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2022-33105
Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID.
https://nvd.nist.gov/vuln/detail/CVE-2022-33105
198,199
curl
1890d59905414ab84a35892b2e45833654aa5c13
https://github.com/curl/curl
https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
tool_writeout: fixed a buffer read overrun on --write-out If a % ended the statement, the string's trailing NUL would be skipped and memory past the end of the buffer would be accessed and potentially displayed as part of the --write-out output. Added tests 1440 and 1441 to check for this kind of condition. Reported-...
1
void ourWriteOut(CURL *curl, struct OutStruct *outs, const char *writeinfo) { FILE *stream = stdout; const char *ptr = writeinfo; char *stringp = NULL; long longinfo; double doubleinfo; while(ptr && *ptr) { if('%' == *ptr) { if('%' == ptr[1]) { /* an escaped %-letter */ fputc('%',...
65,553,640,115,917,050,000,000,000,000,000,000,000
tool_writeout.c
121,122,283,820,249,180,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-7407
The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over...
https://nvd.nist.gov/vuln/detail/CVE-2017-7407
270,333
curl
1890d59905414ab84a35892b2e45833654aa5c13
https://github.com/curl/curl
https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
tool_writeout: fixed a buffer read overrun on --write-out If a % ended the statement, the string's trailing NUL would be skipped and memory past the end of the buffer would be accessed and potentially displayed as part of the --write-out output. Added tests 1440 and 1441 to check for this kind of condition. Reported-...
0
void ourWriteOut(CURL *curl, struct OutStruct *outs, const char *writeinfo) { FILE *stream = stdout; const char *ptr = writeinfo; char *stringp = NULL; long longinfo; double doubleinfo; while(ptr && *ptr) { if('%' == *ptr && ptr[1]) { if('%' == ptr[1]) { /* an escaped %-letter */ ...
81,918,067,402,325,030,000,000,000,000,000,000,000
tool_writeout.c
52,475,688,733,979,850,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-7407
The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over...
https://nvd.nist.gov/vuln/detail/CVE-2017-7407
198,207
FFmpeg
b97a4b658814b2de8b9f2a3bce491c002d34de31
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/b97a4b658814b2de8b9f2a3bce491c002d34de31#diff-cd7e24986650014d67f484f3ffceef3f
cbs_av1: Fix reading of overlong uvlc codes The specification allows 2^32-1 to be encoded as any number of zeroes greater than 31, followed by a one. This previously failed because the trace code would overflow the array containing the string representation of the bits if there were more than 63 zeroes. Fix that by ...
1
static int cbs_av1_read_uvlc(CodedBitstreamContext *ctx, GetBitContext *gbc, const char *name, uint32_t *write_to, uint32_t range_min, uint32_t range_max) { uint32_t value; int position, zeroes, i, j; char bits[65]; if (ctx->trace_enable) ...
319,514,254,426,156,800,000,000,000,000,000,000,000
cbs_av1.c
243,594,783,328,038,650,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-1000016
FFMPEG version 4.1 contains a CWE-129: Improper Validation of Array Index vulnerability in libavcodec/cbs_av1.c that can result in Denial of service. This attack appears to be exploitable via specially crafted AV1 file has to be provided as input. This vulnerability appears to have been fixed in after commit b97a4b6588...
https://nvd.nist.gov/vuln/detail/CVE-2019-1000016
270,434
FFmpeg
b97a4b658814b2de8b9f2a3bce491c002d34de31
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/b97a4b658814b2de8b9f2a3bce491c002d34de31#diff-cd7e24986650014d67f484f3ffceef3f
cbs_av1: Fix reading of overlong uvlc codes The specification allows 2^32-1 to be encoded as any number of zeroes greater than 31, followed by a one. This previously failed because the trace code would overflow the array containing the string representation of the bits if there were more than 63 zeroes. Fix that by ...
0
static int cbs_av1_read_uvlc(CodedBitstreamContext *ctx, GetBitContext *gbc, const char *name, uint32_t *write_to, uint32_t range_min, uint32_t range_max) { uint32_t zeroes, bits_value, value; int position; if (ctx->trace_enable) position = ...
336,620,724,718,153,200,000,000,000,000,000,000,000
cbs_av1.c
83,269,188,888,168,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-1000016
FFMPEG version 4.1 contains a CWE-129: Improper Validation of Array Index vulnerability in libavcodec/cbs_av1.c that can result in Denial of service. This attack appears to be exploitable via specially crafted AV1 file has to be provided as input. This vulnerability appears to have been fixed in after commit b97a4b6588...
https://nvd.nist.gov/vuln/detail/CVE-2019-1000016
198,228
ImageMagick
1dc0ac5016f1c4d50b100a086526d6a2453a5444
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444
https://github.com/ImageMagick/ImageMagick/issues/573
1
static MagickBooleanType WriteMAPImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { MagickBooleanType status; register const Quantum *p; register ssize_t i, x; register unsigned char *q; size_t depth, packet_size; ssize_t y; unsigned char ...
302,892,734,733,764,150,000,000,000,000,000,000,000
map.c
214,304,303,287,443,300,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2017-12663
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMAPImage in coders/map.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12663
270,602
ImageMagick
1dc0ac5016f1c4d50b100a086526d6a2453a5444
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444
https://github.com/ImageMagick/ImageMagick/issues/573
0
static MagickBooleanType WriteMAPImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { MagickBooleanType status; register const Quantum *p; register ssize_t i, x; register unsigned char *q; size_t depth, packet_size; ssize_t y; unsigned char ...
4,233,668,202,309,117,000,000,000,000,000,000,000
None
null
[ "CWE-401" ]
CVE-2017-12663
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMAPImage in coders/map.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12663
198,230
pam_tacplus
4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0
https://github.com/kravietz/pam_tacplus
https://github.com/kravietz/pam_tacplus/commit/4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0
pam: don't leak TACACS+ secret to journald If journald for syslog is used, the journal is going to store everything, even DEBUG loglevel messages. Pre-journald logging of system-wide DEBUG loglevel could be avoided and is not affected in all cases. With journald presence it's probably safe to no longer log sensitive ...
1
int _pam_parse(int argc, const char **argv) { int ctrl = 0; const char *current_secret = NULL; /* otherwise the list will grow with each call */ memset(tac_srv, 0, sizeof(tacplus_server_t) * TAC_PLUS_MAXSERVERS); memset(&tac_srv_addr, 0, sizeof(struct addrinfo) * TAC_PLUS_MAXSERVERS); memset(&t...
140,020,108,721,729,510,000,000,000,000,000,000,000
support.c
81,058,205,765,163,040,000,000,000,000,000,000,000
[ "CWE-532" ]
CVE-2020-13881
In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used.
https://nvd.nist.gov/vuln/detail/CVE-2020-13881
270,626
pam_tacplus
4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0
https://github.com/kravietz/pam_tacplus
https://github.com/kravietz/pam_tacplus/commit/4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0
pam: don't leak TACACS+ secret to journald If journald for syslog is used, the journal is going to store everything, even DEBUG loglevel messages. Pre-journald logging of system-wide DEBUG loglevel could be avoided and is not affected in all cases. With journald presence it's probably safe to no longer log sensitive ...
0
int _pam_parse(int argc, const char **argv) { int ctrl = 0; const char *current_secret = NULL; /* otherwise the list will grow with each call */ memset(tac_srv, 0, sizeof(tacplus_server_t) * TAC_PLUS_MAXSERVERS); memset(&tac_srv_addr, 0, sizeof(struct addrinfo) * TAC_PLUS_MAXSERVERS); memset(&t...
113,020,933,102,283,480,000,000,000,000,000,000,000
support.c
256,270,767,389,570,060,000,000,000,000,000,000,000
[ "CWE-532" ]
CVE-2020-13881
In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used.
https://nvd.nist.gov/vuln/detail/CVE-2020-13881
198,238
asylo
b1d120a2c7d7446d2cc58d517e20a1b184b82200
https://github.com/google/asylo
https://github.com/google/asylo/commit/b1d120a2c7d7446d2cc58d517e20a1b184b82200
Check for return size in enc_untrusted_read Check return size does not exceed requested. The returned result and content still cannot be trusted, but it's expected behavior when not using a secure file system. PiperOrigin-RevId: 333827386 Change-Id: I0bdec0aec9356ea333dc8c647eba5d2772875f29
1
ssize_t enc_untrusted_read(int fd, void *buf, size_t count) { return static_cast<ssize_t>(EnsureInitializedAndDispatchSyscall( asylo::system_call::kSYS_read, fd, buf, count)); }
157,997,923,020,753,940,000,000,000,000,000,000,000
host_calls.cc
83,935,641,637,319,770,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-8942
An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_read whose return size was not validated against the requrested size. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size inclu...
https://nvd.nist.gov/vuln/detail/CVE-2020-8942
270,763
asylo
b1d120a2c7d7446d2cc58d517e20a1b184b82200
https://github.com/google/asylo
https://github.com/google/asylo/commit/b1d120a2c7d7446d2cc58d517e20a1b184b82200
Check for return size in enc_untrusted_read Check return size does not exceed requested. The returned result and content still cannot be trusted, but it's expected behavior when not using a secure file system. PiperOrigin-RevId: 333827386 Change-Id: I0bdec0aec9356ea333dc8c647eba5d2772875f29
0
ssize_t enc_untrusted_read(int fd, void *buf, size_t count) { ssize_t ret = static_cast<ssize_t>(EnsureInitializedAndDispatchSyscall( asylo::system_call::kSYS_read, fd, buf, count)); if (ret != -1 && ret > count) { ::asylo::primitives::TrustedPrimitives::BestEffortAbort( "enc_untrusted_read: read ...
241,091,290,419,272,580,000,000,000,000,000,000,000
host_calls.cc
3,167,262,574,095,635,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-8942
An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_read whose return size was not validated against the requrested size. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size inclu...
https://nvd.nist.gov/vuln/detail/CVE-2020-8942
198,243
ImageMagick
c9aa9f80828594eacbe3affe16c43d623562e5d8
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8
https://github.com/ImageMagick/ImageMagick/issues/550
1
static Image *ReadOneJNGImage(MngInfo *mng_info, const ImageInfo *image_info, ExceptionInfo *exception) { Image *alpha_image, *color_image, *image, *jng_image; ImageInfo *alpha_image_info, *color_image_info; MagickBooleanType logging; ssize_t y; MagickBooleanType st...
337,755,438,894,179,520,000,000,000,000,000,000,000
png.c
228,171,685,898,256,920,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2017-12641
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadOneJNGImage in coders\png.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12641
270,778
ImageMagick
c9aa9f80828594eacbe3affe16c43d623562e5d8
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8
https://github.com/ImageMagick/ImageMagick/issues/550
0
static Image *ReadOneJNGImage(MngInfo *mng_info, const ImageInfo *image_info, ExceptionInfo *exception) { Image *alpha_image, *color_image, *image, *jng_image; ImageInfo *alpha_image_info, *color_image_info; MagickBooleanType logging; ssize_t y; MagickBooleanType st...
183,059,740,976,871,170,000,000,000,000,000,000,000
png.c
290,682,910,480,858,150,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2017-12641
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadOneJNGImage in coders\png.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12641
198,245
png2webp
8f21ad79b0cd98fc22d5b49734543101946abbff
https://github.com/landfillbaby/png2webp
https://github.com/landfillbaby/png2webp/commit/8f21ad79b0cd98fc22d5b49734543101946abbff
v1.0.5: fix buffer overrun when reading bad WebPs
1
static bool w2p(char *ip, char *op) { FILE *fp = openr(ip); if(!fp) return 1; bool openwdone = 0; uint8_t *x = 0, *b = 0; png_struct *p = 0; png_info *n = 0; uint8_t i[12]; char *k[] = {"Out of memory", "Broken config, file a bug report", "Invalid WebP", "???", "???", "???", "I/O error"}; // unsup...
100,090,985,547,595,910,000,000,000,000,000,000,000
png2webp.c
276,030,132,035,029,200,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2022-36752
png2webp v1.0.4 was discovered to contain an out-of-bounds write via the function w2p. This vulnerability is exploitable via a crafted png file.
https://nvd.nist.gov/vuln/detail/CVE-2022-36752
270,782
png2webp
8f21ad79b0cd98fc22d5b49734543101946abbff
https://github.com/landfillbaby/png2webp
https://github.com/landfillbaby/png2webp/commit/8f21ad79b0cd98fc22d5b49734543101946abbff
v1.0.5: fix buffer overrun when reading bad WebPs
0
static bool w2p(char *ip, char *op) { FILE *fp = openr(ip); if(!fp) return 1; bool openwdone = 0; uint8_t *x = 0, *b = 0; png_struct *p = 0; png_info *n = 0; uint8_t i[12]; char *k[] = {"Out of memory", "Broken config, file a bug report", "Invalid WebP", "???", "???", "???", "I/O error"}; // unsup...
87,093,683,829,054,530,000,000,000,000,000,000,000
png2webp.c
90,517,462,464,857,550,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2022-36752
png2webp v1.0.4 was discovered to contain an out-of-bounds write via the function w2p. This vulnerability is exploitable via a crafted png file.
https://nvd.nist.gov/vuln/detail/CVE-2022-36752
198,318
vlc
2e7c7091a61aa5d07e7997b393d821e91f593c39
https://github.com/videolan/vlc
https://github.com/videolan/vlc/commit/2e7c7091a61aa5d07e7997b393d821e91f593c39
demux: mp4: fix buffer overflow in parsing of string boxes. We ensure that pbox->i_size is never smaller than 8 to avoid an integer underflow in the third argument of the subsequent call to memcpy. We also make sure no truncation occurs when passing values derived from the 64 bit integer p_box->i_size to arguments of ...
1
static int MP4_ReadBox_String( stream_t *p_stream, MP4_Box_t *p_box ) { MP4_READBOX_ENTER( MP4_Box_data_string_t ); p_box->data.p_string->psz_text = malloc( p_box->i_size + 1 - 8 ); /* +\0, -name, -size */ if( p_box->data.p_string->psz_text == NULL ) MP4_READBOX_EXIT( 0 ); memcpy( p_box->data....
100,810,936,632,355,560,000,000,000,000,000,000,000
libmp4.c
187,976,638,914,246,420,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2014-9627
The MP4_ReadBox_String function in modules/demux/mp4/libmp4.c in VideoLAN VLC media player before 2.1.6 performs an incorrect cast operation from a 64-bit integer to a 32-bit integer, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large box size.
https://nvd.nist.gov/vuln/detail/CVE-2014-9627
272,404
vlc
2e7c7091a61aa5d07e7997b393d821e91f593c39
https://github.com/videolan/vlc
https://github.com/videolan/vlc/commit/2e7c7091a61aa5d07e7997b393d821e91f593c39
demux: mp4: fix buffer overflow in parsing of string boxes. We ensure that pbox->i_size is never smaller than 8 to avoid an integer underflow in the third argument of the subsequent call to memcpy. We also make sure no truncation occurs when passing values derived from the 64 bit integer p_box->i_size to arguments of ...
0
static int MP4_ReadBox_String( stream_t *p_stream, MP4_Box_t *p_box ) { MP4_READBOX_ENTER( MP4_Box_data_string_t ); if( p_box->i_size < 8 || p_box->i_size > SIZE_MAX ) MP4_READBOX_EXIT( 0 ); p_box->data.p_string->psz_text = malloc( p_box->i_size + 1 - 8 ); /* +\0, -name, -size */ if( p_box->da...
300,150,811,172,855,570,000,000,000,000,000,000,000
libmp4.c
306,379,992,770,123,940,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2014-9627
The MP4_ReadBox_String function in modules/demux/mp4/libmp4.c in VideoLAN VLC media player before 2.1.6 performs an incorrect cast operation from a 64-bit integer to a 32-bit integer, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large box size.
https://nvd.nist.gov/vuln/detail/CVE-2014-9627
198,330
ImageMagick
eac8ce4d873f28bb6a46aa3a662fb196b49b95d0
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0
fix #5033: runtime error: load of misaligned address (#5034) * fix Division by zero in XMenuWidget() of MagickCore/widget.c * Fix memory leak in AnimateImageCommand() of MagickWand/animate.c and DisplayImageCommand() of MagickWand/display.c * fix Division by zero in ReadEnhMetaFile() of coders/emf.c * Resolve confl...
1
static MagickBooleanType GetEXIFProperty(const Image *image, const char *property,ExceptionInfo *exception) { #define MaxDirectoryStack 16 #define EXIF_DELIMITER "\n" #define EXIF_NUM_FORMATS 12 #define EXIF_FMT_BYTE 1 #define EXIF_FMT_STRING 2 #define EXIF_FMT_USHORT 3 #define EXIF_FMT_ULONG 4 #define EXIF_FM...
32,208,848,236,178,600,000,000,000,000,000,000,000
property.c
82,190,644,811,326,830,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-32547
In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other probl...
https://nvd.nist.gov/vuln/detail/CVE-2022-32547
272,906
ImageMagick
eac8ce4d873f28bb6a46aa3a662fb196b49b95d0
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0
fix #5033: runtime error: load of misaligned address (#5034) * fix Division by zero in XMenuWidget() of MagickCore/widget.c * Fix memory leak in AnimateImageCommand() of MagickWand/animate.c and DisplayImageCommand() of MagickWand/display.c * fix Division by zero in ReadEnhMetaFile() of coders/emf.c * Resolve confl...
0
static MagickBooleanType GetEXIFProperty(const Image *image, const char *property,ExceptionInfo *exception) { #define MaxDirectoryStack 16 #define EXIF_DELIMITER "\n" #define EXIF_NUM_FORMATS 12 #define EXIF_FMT_BYTE 1 #define EXIF_FMT_STRING 2 #define EXIF_FMT_USHORT 3 #define EXIF_FMT_ULONG 4 #define EXIF_FM...
46,887,717,838,165,560,000,000,000,000,000,000,000
property.c
63,096,947,796,879,110,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-32547
In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other probl...
https://nvd.nist.gov/vuln/detail/CVE-2022-32547
198,343
tensorflow
9728c60e136912a12d99ca56e106b7cce7af5986
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986
Ensure validation sticks in `save_restore_v2_ops.cc` PiperOrigin-RevId: 387924206 Change-Id: I6156842eb3230076b5812c0815f3e66bd5241454
1
void Compute(OpKernelContext* context) override { const Tensor& prefix = context->input(0); const Tensor& tensor_names = context->input(1); const Tensor& shape_and_slices = context->input(2); ValidateInputs(true /* is save op */, context, prefix, tensor_names, shape_and_slices); ...
254,461,778,286,763,430,000,000,000,000,000,000,000
save_restore_v2_ops.cc
174,819,196,505,645,780,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-37648
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the code for `tf.raw_ops.SaveV2` does not properly validate the inputs and an attacker can trigger a null pointer dereference. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5...
https://nvd.nist.gov/vuln/detail/CVE-2021-37648
273,027
tensorflow
9728c60e136912a12d99ca56e106b7cce7af5986
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986
Ensure validation sticks in `save_restore_v2_ops.cc` PiperOrigin-RevId: 387924206 Change-Id: I6156842eb3230076b5812c0815f3e66bd5241454
0
void Compute(OpKernelContext* context) override { const Tensor& prefix = context->input(0); const Tensor& tensor_names = context->input(1); const Tensor& shape_and_slices = context->input(2); ValidateInputs(true /* is save op */, context, prefix, tensor_names, shape_and_slices); ...
168,394,260,644,962,120,000,000,000,000,000,000,000
save_restore_v2_ops.cc
175,844,667,481,404,750,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-37648
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the code for `tf.raw_ops.SaveV2` does not properly validate the inputs and an attacker can trigger a null pointer dereference. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5...
https://nvd.nist.gov/vuln/detail/CVE-2021-37648
198,344
tensorflow
9728c60e136912a12d99ca56e106b7cce7af5986
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986
Ensure validation sticks in `save_restore_v2_ops.cc` PiperOrigin-RevId: 387924206 Change-Id: I6156842eb3230076b5812c0815f3e66bd5241454
1
void Compute(OpKernelContext* context) override { const Tensor& prefix = context->input(0); const Tensor& tensor_names = context->input(1); const Tensor& shape_and_slices = context->input(2); OP_REQUIRES(context, tensor_names.NumElements() == dtypes_.size(), errors::InvalidArgument("Go...
150,693,900,930,779,220,000,000,000,000,000,000,000
save_restore_v2_ops.cc
174,819,196,505,645,780,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-37648
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the code for `tf.raw_ops.SaveV2` does not properly validate the inputs and an attacker can trigger a null pointer dereference. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5...
https://nvd.nist.gov/vuln/detail/CVE-2021-37648
273,031
tensorflow
9728c60e136912a12d99ca56e106b7cce7af5986
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986
Ensure validation sticks in `save_restore_v2_ops.cc` PiperOrigin-RevId: 387924206 Change-Id: I6156842eb3230076b5812c0815f3e66bd5241454
0
void Compute(OpKernelContext* context) override { const Tensor& prefix = context->input(0); const Tensor& tensor_names = context->input(1); const Tensor& shape_and_slices = context->input(2); OP_REQUIRES(context, tensor_names.NumElements() == dtypes_.size(), errors::InvalidArgument("Go...
315,398,120,898,678,300,000,000,000,000,000,000,000
save_restore_v2_ops.cc
175,844,667,481,404,750,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-37648
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the code for `tf.raw_ops.SaveV2` does not properly validate the inputs and an attacker can trigger a null pointer dereference. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5...
https://nvd.nist.gov/vuln/detail/CVE-2021-37648
198,348
libsixel
7808a06b88c11dbc502318cdd51fa374f8cd47ee
https://github.com/saitoha/libsixel
https://github.com/saitoha/libsixel/commit/7808a06b88c11dbc502318cdd51fa374f8cd47ee
gif loader: check LZW code size (Issue #75)
1
gif_process_raster( gif_context_t /* in */ *s, gif_t /* in */ *g ) { SIXELSTATUS status = SIXEL_FALSE; unsigned char lzw_cs; signed int len, code; unsigned int first; signed int codesize, codemask, avail, oldcode, bits, valid_bits, clear; gif_lzw *p; lzw_cs = gif_get8(s); ...
255,989,561,143,238,160,000,000,000,000,000,000,000
fromgif.c
300,708,157,559,881,100,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-21050
Libsixel prior to v1.8.3 contains a stack buffer overflow in the function gif_process_raster at fromgif.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-21050
273,042
libsixel
7808a06b88c11dbc502318cdd51fa374f8cd47ee
https://github.com/saitoha/libsixel
https://github.com/saitoha/libsixel/commit/7808a06b88c11dbc502318cdd51fa374f8cd47ee
gif loader: check LZW code size (Issue #75)
0
gif_process_raster( gif_context_t /* in */ *s, gif_t /* in */ *g ) { SIXELSTATUS status = SIXEL_FALSE; unsigned char lzw_cs; signed int len, code; unsigned int first; signed int codesize, codemask, avail, oldcode, bits, valid_bits, clear; gif_lzw *p; /* LZW Minimum Code Size...
263,006,748,068,721,100,000,000,000,000,000,000,000
fromgif.c
38,689,493,416,035,583,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-21050
Libsixel prior to v1.8.3 contains a stack buffer overflow in the function gif_process_raster at fromgif.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-21050
198,351
gpac
98b727637e32d1d4824101d8947e2dbd573d4fc8
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/98b727637e32d1d4824101d8947e2dbd573d4fc8
be stricter in PAT processing - cf #1269
1
static void gf_m2ts_process_pat(GF_M2TS_Demuxer *ts, GF_M2TS_SECTION_ES *ses, GF_List *sections, u8 table_id, u16 ex_table_id, u8 version_number, u8 last_section_number, u32 status) { GF_M2TS_Program *prog; GF_M2TS_SECTION_ES *pmt; u32 i, nb_progs, evt_type; u32 nb_sections; u32 data_size; unsigned char *data; G...
288,554,605,512,424,770,000,000,000,000,000,000,000
mpegts.c
95,224,966,645,898,480,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-20628
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a Use-After-Free vulnerability in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
https://nvd.nist.gov/vuln/detail/CVE-2019-20628
273,110
gpac
98b727637e32d1d4824101d8947e2dbd573d4fc8
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/98b727637e32d1d4824101d8947e2dbd573d4fc8
be stricter in PAT processing - cf #1269
0
static void gf_m2ts_process_pat(GF_M2TS_Demuxer *ts, GF_M2TS_SECTION_ES *ses, GF_List *sections, u8 table_id, u16 ex_table_id, u8 version_number, u8 last_section_number, u32 status) { GF_M2TS_Program *prog; GF_M2TS_SECTION_ES *pmt; u32 i, nb_progs, evt_type; u32 nb_sections; u32 data_size; unsigned char *data; G...
295,182,302,544,603,900,000,000,000,000,000,000,000
mpegts.c
236,951,061,127,109,280,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-20628
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a Use-After-Free vulnerability in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
https://nvd.nist.gov/vuln/detail/CVE-2019-20628
198,397
tensorflow
7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d
Address QuantizeAndDequantizeV* heap oob. Added additional checks for the 'axis' attribute. PiperOrigin-RevId: 402446942 Change-Id: Id2f6b82e4e740d0550329be02621c46466b5a5b9
1
TEST(ArrayOpsTest, QuantizeAndDequantizeV2_ShapeFn) { ShapeInferenceTestOp op("QuantizeAndDequantizeV2"); op.input_tensors.resize(3); TF_ASSERT_OK(NodeDefBuilder("test", "QuantizeAndDequantizeV2") .Input("input", 0, DT_FLOAT) .Input("input_min", 1, DT_FLOAT) ...
57,723,305,468,956,070,000,000,000,000,000,000,000
array_ops_test.cc
295,306,346,367,017,900,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-41205
TensorFlow is an open source platform for machine learning. In affected versions the shape inference functions for the `QuantizeAndDequantizeV*` operations can trigger a read outside of bounds of heap allocated array. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1,...
https://nvd.nist.gov/vuln/detail/CVE-2021-41205
273,801
tensorflow
7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d
Address QuantizeAndDequantizeV* heap oob. Added additional checks for the 'axis' attribute. PiperOrigin-RevId: 402446942 Change-Id: Id2f6b82e4e740d0550329be02621c46466b5a5b9
0
TEST(ArrayOpsTest, QuantizeAndDequantizeV2_ShapeFn) { ShapeInferenceTestOp op("QuantizeAndDequantizeV2"); op.input_tensors.resize(3); TF_ASSERT_OK(NodeDefBuilder("test", "QuantizeAndDequantizeV2") .Input("input", 0, DT_FLOAT) .Input("input_min", 1, DT_FLOAT) ...
6,570,683,595,018,333,000,000,000,000,000,000,000
array_ops_test.cc
303,479,682,034,495,700,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-41205
TensorFlow is an open source platform for machine learning. In affected versions the shape inference functions for the `QuantizeAndDequantizeV*` operations can trigger a read outside of bounds of heap allocated array. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1,...
https://nvd.nist.gov/vuln/detail/CVE-2021-41205
198,408
LibRaw
1334647862b0c90b2e8cb2f668e66627d9517b17
https://github.com/LibRaw/LibRaw
https://github.com/LibRaw/LibRaw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17
parse_qt: possible integer overflow
1
void CLASS parse_qt (int end) { unsigned save, size; char tag[4]; order = 0x4d4d; while (ftell(ifp)+7 < end) { save = ftell(ifp); if ((size = get4()) < 8) return; fread (tag, 4, 1, ifp); if (!memcmp(tag,"moov",4) || !memcmp(tag,"udta",4) || !memcmp(tag,"CNTH",4)) parse_qt (save+size); ...
214,849,665,339,367,260,000,000,000,000,000,000,000
dcraw.c
244,721,317,821,702,520,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-5815
An integer overflow error within the "parse_qt()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger an infinite loop via a specially crafted Apple QuickTime file.
https://nvd.nist.gov/vuln/detail/CVE-2018-5815
274,061
LibRaw
1334647862b0c90b2e8cb2f668e66627d9517b17
https://github.com/LibRaw/LibRaw
https://github.com/LibRaw/LibRaw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17
parse_qt: possible integer overflow
0
void CLASS parse_qt (int end) { unsigned save, size; char tag[4]; order = 0x4d4d; while (ftell(ifp)+7 < end) { save = ftell(ifp); if ((size = get4()) < 8) return; if ((int)size < 0) return; // 2+GB is too much if (save + size < save) return; // 32bit overflow fread (tag, 4, 1, ifp); if ...
80,438,067,894,781,925,000,000,000,000,000,000,000
dcraw.c
215,082,004,711,907,140,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-5815
An integer overflow error within the "parse_qt()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger an infinite loop via a specially crafted Apple QuickTime file.
https://nvd.nist.gov/vuln/detail/CVE-2018-5815
198,410
ImageMagick
c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e
https://github.com/ImageMagick/ImageMagick/issues/577
1
static MagickBooleanType WritePICTImage(const ImageInfo *image_info, Image *image,ExceptionInfo *exception) { #define MaxCount 128 #define PictCropRegionOp 0x01 #define PictEndOfPictureOp 0xff #define PictJPEGOp 0x8200 #define PictInfoOp 0x0C00 #define PictInfoSize 512 #define PictPixmapOp 0x9A #define PictPIC...
170,906,067,123,033,920,000,000,000,000,000,000,000
pict.c
161,357,167,936,244,980,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2017-12665
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePICTImage in coders/pict.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12665
274,069
ImageMagick
c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e
https://github.com/ImageMagick/ImageMagick/issues/577
0
static MagickBooleanType WritePICTImage(const ImageInfo *image_info, Image *image,ExceptionInfo *exception) { #define MaxCount 128 #define PictCropRegionOp 0x01 #define PictEndOfPictureOp 0xff #define PictJPEGOp 0x8200 #define PictInfoOp 0x0C00 #define PictInfoSize 512 #define PictPixmapOp 0x9A #define PictPIC...
107,249,901,361,924,630,000,000,000,000,000,000,000
pict.c
138,795,199,755,002,620,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2017-12665
ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePICTImage in coders/pict.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12665
198,427
mongoose
c65c8fdaaa257e0487ab0aaae9e8f6b439335945
https://github.com/cesanta/mongoose
https://github.com/cesanta/mongoose/commit/c65c8fdaaa257e0487ab0aaae9e8f6b439335945
Protect against the directory traversal in mg_upload()
1
int mg_http_upload(struct mg_connection *c, struct mg_http_message *hm, const char *dir) { char offset[40] = "", name[200] = "", path[256]; mg_http_get_var(&hm->query, "offset", offset, sizeof(offset)); mg_http_get_var(&hm->query, "name", name, sizeof(name)); if (name[0] == '\0') { mg_htt...
12,954,600,658,581,306,000,000,000,000,000,000,000
mongoose.c
325,284,919,560,067,950,000,000,000,000,000,000,000
[ "CWE-552" ]
CVE-2022-25299
This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder.
https://nvd.nist.gov/vuln/detail/CVE-2022-25299
274,398
mongoose
c65c8fdaaa257e0487ab0aaae9e8f6b439335945
https://github.com/cesanta/mongoose
https://github.com/cesanta/mongoose/commit/c65c8fdaaa257e0487ab0aaae9e8f6b439335945
Protect against the directory traversal in mg_upload()
0
int mg_http_upload(struct mg_connection *c, struct mg_http_message *hm, const char *dir) { char offset[40] = "", name[200] = "", path[256]; mg_http_get_var(&hm->query, "offset", offset, sizeof(offset)); mg_http_get_var(&hm->query, "name", name, sizeof(name)); if (name[0] == '\0') { mg_htt...
143,871,410,773,104,650,000,000,000,000,000,000,000
mongoose.c
44,693,956,672,582,490,000,000,000,000,000,000,000
[ "CWE-552" ]
CVE-2022-25299
This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder.
https://nvd.nist.gov/vuln/detail/CVE-2022-25299
198,432
ImageMagick
72a50e400d98d7a2fd610caedfeb9af043dc5582
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/72a50e400d98d7a2fd610caedfeb9af043dc5582
Fixed potential memory leak.
1
static Image *ReadSCREENSHOTImage(const ImageInfo *image_info, ExceptionInfo *exception) { Image *image; assert(image_info->signature == MagickCoreSignature); if (image_info->debug != MagickFalse) (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s", image_info->filename); assert(exception !...
7,002,244,531,704,570,000,000,000,000,000,000,000
screenshot.c
137,058,891,405,669,530,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2017-11447
The ReadSCREENSHOTImage function in coders/screenshot.c in ImageMagick before 7.0.6-1 has memory leaks, causing denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2017-11447
274,626
ImageMagick
72a50e400d98d7a2fd610caedfeb9af043dc5582
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/72a50e400d98d7a2fd610caedfeb9af043dc5582
Fixed potential memory leak.
0
static Image *ReadSCREENSHOTImage(const ImageInfo *image_info, ExceptionInfo *exception) { Image *image; assert(image_info->signature == MagickCoreSignature); if (image_info->debug != MagickFalse) (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s", image_info->filename); assert(exception !...
195,195,812,353,012,080,000,000,000,000,000,000,000
screenshot.c
147,139,327,551,068,630,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2017-11447
The ReadSCREENSHOTImage function in coders/screenshot.c in ImageMagick before 7.0.6-1 has memory leaks, causing denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2017-11447
198,434
ImageMagick
73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
https://github.com/ImageMagick/ImageMagick/issues/571
1
static MagickBooleanType WriteCALSImage(const ImageInfo *image_info, Image *image,ExceptionInfo *exception) { char header[129]; Image *group4_image; ImageInfo *write_info; MagickBooleanType status; register ssize_t i; size_t density, length, orient_x, orient_y; ...
138,610,425,073,862,160,000,000,000,000,000,000,000
cals.c
181,202,913,145,730,670,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2017-12669
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteCALSImage in coders/cals.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12669
274,638
ImageMagick
73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
https://github.com/ImageMagick/ImageMagick/issues/571
0
static MagickBooleanType WriteCALSImage(const ImageInfo *image_info, Image *image,ExceptionInfo *exception) { char header[129]; Image *group4_image; ImageInfo *write_info; MagickBooleanType status; register ssize_t i; size_t density, length, orient_x, orient_y; ...
163,371,586,791,865,260,000,000,000,000,000,000,000
cals.c
272,257,818,720,102,930,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2017-12669
ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteCALSImage in coders/cals.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12669
198,464
ntopng
01f47e04fd7c8d54399c9e465f823f0017069f8f
https://github.com/ntop/ntopng
https://github.com/ntop/ntopng/commit/01f47e04fd7c8d54399c9e465f823f0017069f8f
Security fix: prevents empty host from being used
1
void Lua::setParamsTable(lua_State* vm, const char* table_name, const char* query) const { char outbuf[FILENAME_MAX]; char *where; char *tok; char *query_string = query ? strdup(query) : NULL; lua_newtable(L); if (query_string) { // ntop->getTrace()->traceEvent(TRACE_WARNING, "[HTTP] %s", query_s...
269,432,345,770,926,100,000,000,000,000,000,000,000
Lua.cpp
203,107,689,470,583,940,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-7458
The NetworkInterface::getHost function in NetworkInterface.cpp in ntopng before 3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty field that should have contained a hostname or IP address.
https://nvd.nist.gov/vuln/detail/CVE-2017-7458
275,376
ntopng
01f47e04fd7c8d54399c9e465f823f0017069f8f
https://github.com/ntop/ntopng
https://github.com/ntop/ntopng/commit/01f47e04fd7c8d54399c9e465f823f0017069f8f
Security fix: prevents empty host from being used
0
void Lua::setParamsTable(lua_State* vm, const char* table_name, const char* query) const { char outbuf[FILENAME_MAX]; char *where; char *tok; char *query_string = query ? strdup(query) : NULL; lua_newtable(L); if (query_string) { // ntop->getTrace()->traceEvent(TRACE_WARNING, "[HTTP] %s", query_s...
131,726,899,184,721,740,000,000,000,000,000,000,000
Lua.cpp
181,103,551,699,667,720,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-7458
The NetworkInterface::getHost function in NetworkInterface.cpp in ntopng before 3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty field that should have contained a hostname or IP address.
https://nvd.nist.gov/vuln/detail/CVE-2017-7458
198,479
trojita
25fffa3e25cbad85bbca804193ad336b090a9ce1
https://github.com/jktjkt/trojita
https://github.com/jktjkt/trojita/commit/25fffa3e25cbad85bbca804193ad336b090a9ce1
IMAP: refuse to work when STARTTLS is required but server sends PREAUTH Oops, we cannot send STARTTLS when the connection is already authenticated. This is serious enough to warrant an error; an attacker might be going after a plaintext of a message we're going to APPEND, etc. Thanks to Arnt Gulbrandsen on the imap-p...
1
bool OpenConnectionTask::handleStateHelper(const Imap::Responses::State *const resp) { if (_dead) { _failed("Asked to die"); return true; } using namespace Imap::Responses; if (model->accessParser(parser).connState == CONN_STATE_CONNECTED_PRETLS_PRECAPS) { if (!resp->tag.isEmpty...
98,540,961,767,259,130,000,000,000,000,000,000,000
OpenConnectionTask.cpp
95,886,561,980,343,760,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2014-2567
The OpenConnectionTask::handleStateHelper function in Imap/Tasks/OpenConnectionTask.cpp in Trojita before 0.4.1 allows man-in-the-middle attackers to trigger use of cleartext for saving a message into a (1) sent or (2) draft folder via a PREAUTH response that prevents later use of the STARTTLS command.
https://nvd.nist.gov/vuln/detail/CVE-2014-2567
275,540
trojita
25fffa3e25cbad85bbca804193ad336b090a9ce1
https://github.com/jktjkt/trojita
https://github.com/jktjkt/trojita/commit/25fffa3e25cbad85bbca804193ad336b090a9ce1
IMAP: refuse to work when STARTTLS is required but server sends PREAUTH Oops, we cannot send STARTTLS when the connection is already authenticated. This is serious enough to warrant an error; an attacker might be going after a plaintext of a message we're going to APPEND, etc. Thanks to Arnt Gulbrandsen on the imap-p...
0
bool OpenConnectionTask::handleStateHelper(const Imap::Responses::State *const resp) { if (_dead) { _failed("Asked to die"); return true; } using namespace Imap::Responses; if (model->accessParser(parser).connState == CONN_STATE_CONNECTED_PRETLS_PRECAPS) { if (!resp->tag.isEmpty...
254,236,322,733,180,330,000,000,000,000,000,000,000
OpenConnectionTask.cpp
238,932,083,935,346,280,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2014-2567
The OpenConnectionTask::handleStateHelper function in Imap/Tasks/OpenConnectionTask.cpp in Trojita before 0.4.1 allows man-in-the-middle attackers to trigger use of cleartext for saving a message into a (1) sent or (2) draft folder via a PREAUTH response that prevents later use of the STARTTLS command.
https://nvd.nist.gov/vuln/detail/CVE-2014-2567
198,487
radare2
d37d2b858ac47f2f108034be0bcecadaddfbc8b3
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/d37d2b858ac47f2f108034be0bcecadaddfbc8b3
Fix #10465 - Avoid string on low addresses (workaround) for corrupted dwarf (#10478)
1
static const ut8 *r_bin_dwarf_parse_comp_unit(Sdb *s, const ut8 *obuf, RBinDwarfCompUnit *cu, const RBinDwarfDebugAbbrev *da, size_t offset, const ut8 *debug_str, size_t debug_str_len) { const ut8 *buf = obuf, *buf_end = obuf + (cu->hdr.length - 7); ut64 abbr_code; size_t i; if (cu->hdr.length > debug_str_len...
129,458,135,297,085,340,000,000,000,000,000,000,000
dwarf.c
233,268,709,250,246,400,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14015
The sdb_set_internal function in sdb.c in radare2 2.7.0 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted ELF file because of missing input validation in r_bin_dwarf_parse_comp_unit in libr/bin/dwarf.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-14015
275,720
radare2
d37d2b858ac47f2f108034be0bcecadaddfbc8b3
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/d37d2b858ac47f2f108034be0bcecadaddfbc8b3
Fix #10465 - Avoid string on low addresses (workaround) for corrupted dwarf (#10478)
0
static const ut8 *r_bin_dwarf_parse_comp_unit(Sdb *s, const ut8 *obuf, RBinDwarfCompUnit *cu, const RBinDwarfDebugAbbrev *da, size_t offset, const ut8 *debug_str, size_t debug_str_len) { const ut8 *buf = obuf, *buf_end = obuf + (cu->hdr.length - 7); ut64 abbr_code; size_t i; if (cu->hdr.length > debug_str_len...
151,549,062,093,841,920,000,000,000,000,000,000,000
dwarf.c
175,783,324,447,862,600,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14015
The sdb_set_internal function in sdb.c in radare2 2.7.0 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted ELF file because of missing input validation in r_bin_dwarf_parse_comp_unit in libr/bin/dwarf.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-14015
198,506
FreeRDP
0d79670a28c0ab049af08613621aa0c267f977e9
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/0d79670a28c0ab049af08613621aa0c267f977e9
Fixed missing input checks for file contents request reported by Valentino Ricotta (Thalium)
1
wf_cliprdr_server_file_contents_request(CliprdrClientContext* context, const CLIPRDR_FILE_CONTENTS_REQUEST* fileContentsRequest) { DWORD uSize = 0; BYTE* pData = NULL; HRESULT hRet = S_OK; FORMATETC vFormatEtc; LPDATAOBJECT pDataObj = NULL; STGMEDIUM vStgMedium; BOOL bIsSt...
134,611,210,485,978,080,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2021-37594
In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_SIZE File Contents Request PDU.
https://nvd.nist.gov/vuln/detail/CVE-2021-37594